Social networks and social media, such as Facebook, Twitter, and Instagram, are some of the most popular services on the web with hundreds of millions of users. Public information that people share on these sites can be of value to anyone interested in investigating people of interest through open, public sources. A social media investigation looks at social media posts, status updates, photos, and individual conversations. You may need a social media investigation for a court case, a custody case, or as part of a background investigation.
During a social media investigation, the investigator will search for key terms and positions relevant to the objectives of the investigation. In most cases, high-powered software will be used to search, monitor, and set up alerts for new posts and account creations according to the investigation needs.
Start your ProjectWhat We Offer
Social networks and social media, such as Facebook, Twitter, and Instagram, are some of the most popular services on the web with hundreds of millions of users. Public information that people share on these sites can be of value to anyone interested in investigating people of interest through open, public sources.
Social Media Advice
From data recovery to how the applications operate, our analysts can provide clients advice and evidential opportunities in Social Media.
OSINT/SOCMINT
Our experts are trained to conduct OSINT to capture information obtained from our online investigations and provide an easy-to-follow report.
Digital Investigation
Our experts can conduct case reviews for prosecution/defence and ensure that the evidence produced is sound and obtained to an evidential standard.
Other Methods
Investigation method can assist in a whole range of information gathering such as image analysis, email investigation and database analysis.
How We Work
Vision
1st French cybersecurity pure-player, NeosLab will assist you to take the lead and make security a differentiating asset for your business and activities.
Challenge
Everything you need to protect your organisation is already there but the key is your ability to organise and deploy for a proper implentation.
Expertise
We centralize all the expertise from vulnerability assessments to penetration audit to drive an optimized security operational management.
Integration
We can integrate your organization's industry-specific requirements with tailored solutions and each of its stakeholder's business issues.