OSINT Pt.2: Social Media OSINT
TikTok, Facebook & Instagram
Billions of posts, selfies, and stories uploaded every day make social media a goldmine for OSINT. From geotags to background clues, we’ll explore how TikTok, Facebook, and Instagram reveal more than users intend—and how attackers exploit it.

Every post tells a story. Social media OSINT is about reading the hidden chapters—location data, timelines, patterns, and impersonation campaigns—that most users never realize they’re revealing.

Why Social Media is an OSINT Goldmine
Social media is where people share the rawest version of themselves: daily routines, relationships, work updates, holiday plans, even frustrations. Billions of new posts across TikTok, Instagram, and Facebook are added each day—making these platforms unfiltered OSINT treasure troves.
What makes social media uniquely powerful for OSINT?
- Volume: So much content that patterns emerge fast.
- Authenticity: People overshare personal details without realizing it.
- Context: Photos/videos provide rich background data.
- Connectivity: Friends, likes, and follows expose entire networks.
For attackers, this means profiling victims, planning scams, or targeting companies.
For analysts, it means verifying claims, mapping threat groups, and exposing fake personas.
TikTok OSINT – Clues Hidden in Videos
Why TikTok Matters
- Video-first platform → constant visual context.
- Younger audience → often less cautious about privacy.
- Trends and hashtags → link users to specific times, places, or events.
Step-by-Step Demo: Extracting Location Clues
- Copy a public TikTok video URL.
- Pause the video at multiple frames.
- Look for:
- Street signs
- Shop logos
- License plates
- Unique buildings or murals
- Screenshot frames and run through Google Images or Yandex.
- Correlate with Google Maps/Street View.
Real Case Example
During protests in 2023, investigators geolocated TikTok videos by identifying a single fast-food outlet logo in the background. That clue pinpointed the street corner where the video was filmed, confirming the event’s authenticity.
Analyst Tips
- Use InVID to break down videos frame-by-frame.
- Cross-reference with weather data (cloud cover, temperature) for timeline accuracy.
Public Takeaway
Even if you don’t enable geotags, the background of a TikTok often gives away your exact location.
Instagram OSINT – The Check-In Problem
Why Instagram Matters
- Visual-first platform (photos + reels).
- Geotags & hashtags expose locations.
- Stories provide time-sensitive info (but can be screenshotted by OSINT pros).
Step-by-Step Demo: Tracing a Daily Routine
- Pull several Instagram posts or stories.
- Check location tags (public or auto-added).
- Look at timestamps—when does the user post?
- Map repeated check-ins → daily patterns.
Real Case Example
A victim unknowingly revealed her morning routine by tagging the same café in multiple Instagram stories. Within days, anyone could predict where and when she’d be.
Analyst Tips
- Hashtags like #gym #workout often include mirrors with visible background details.
- Story screenshots + EXIF extraction (if original media obtained) = geolocation gold.
Public Takeaway
Never tag your live location. Post after you’ve left a venue or blur out identifying details.
Facebook OSINT – The Social Graph
Why Facebook Matters
- Legacy data: Profiles often span 10+ years.
- About section: Jobs, schools, contact info.
- Family & friends lists: Build entire relationship maps.
Step-by-Step Demo: Building a Social Graph
- Open a target profile (if public).
- Collect:
- About info (workplace, city, school).
- Family members listed.
- Public friends list.
- Cross-match names with LinkedIn or Instagram.
- Create a map of connections → spouse, kids, coworkers.
Real Case Example
A fraudster operated multiple Facebook accounts under different names. Investigators noticed that each “alias” listed the same wife and kids in the Family section. That single detail collapsed the entire network of fake personas.
Analyst Tips
- Archived Facebook posts can be gold. Use Wayback Machine.
- Friend overlap across accounts exposes sockpuppets.
Public Takeaway
Your Facebook isn’t just about you—it’s about everyone connected to you. Loose privacy settings expose family, workplace, and more.
Cross-Platform Pivots – Connecting the Dots
One of the most powerful aspects of social media OSINT is pivoting:
- Same username across TikTok, Instagram, Facebook, Twitter.
- Same profile picture recycled across platforms.
- Same bio details (job title, city).
Step-by-Step Demo: Username Pivot
- Extract a username (e.g.,
coolguy123). - Run through tools like Sherlock, Maigret, or Social Analyzer.
- Identify accounts with the same username on 20+ platforms.
- Confirm matches via profile pics or bio overlap.
Public Takeaway: Reusing the same username everywhere makes it trivial to build a full dossier on you.
Impersonation & Cloned Profiles
Attackers recycle your own content to impersonate you:
- Romance scams → cloned accounts with your photos.
- Fake businesses → your brand logo and posts reused.
- Political manipulation → impersonating influencers.
How Analysts Spot Them
- Reverse image search profile pics.
- Compare friend lists—often mismatched.
- Check timestamps—fake accounts often bulk-post old content.
Public Takeaway: If you find clones of your account, report them immediately—don’t just ignore them.
Protecting Yourself
- Disable geotags in phone/camera settings.
- Don’t tag live locations—share after leaving.
- Audit old posts—clean up outdated info.
- Use unique usernames across platforms.
- Lock privacy settings on Facebook & Instagram.
For analysts:
- Add social OSINT to your workflow—fake personas are often sloppy.
- Use time zone analysis (posting hours) to infer attacker location.
- Combine social OSINT with WHOIS/domain research for deeper pivots.
Key Takeaway
Social media is an OSINT goldmine.
- TikTok reveals location clues from video backgrounds.
- Instagram exposes patterns and routines.
- Facebook hands over entire social graphs.
- Cross-platform pivots tie everything together.
The danger? Attackers exploit oversharing for scams, impersonation, and profiling.
The solution? Awareness, privacy discipline, and smarter investigation techniques.
Up Next:
OSINT Pt.3: Geolocation from Images & Videos – Landmarks, Shadows & Weather