đą Social Media Investigation Guide
OSINT Techniques for Attorneys, Investigators & Businesses â 2026 Complete Guide
đ What This Guide Covers
Why Social Media Investigation Matters
Social media has become one of the most powerful and underutilized tools in modern investigations. People share extraordinary amounts of information about their lives, activities, assets, relationships, and intentions online â often without realizing that this information can be discovered, preserved, and used as evidence in legal proceedings. For attorneys litigating fraud, collection, or family law cases; for businesses conducting due diligence; and for investigators locating missing persons or verifying claims â social media investigation has become an essential skill that produces results no other investigative method can match. đą
The power of social media investigation lies in the fact that people present their authentic lives online in ways they would never reveal in formal settings. A judgment debtor claiming to have no assets may post photos of a new boat on Instagram. A disability claimant may share videos of physical activities that contradict their claimed limitations. A business partner under investigation may reveal connections to competing businesses through LinkedIn. A person who has disappeared to avoid legal obligations may inadvertently reveal their current location through geotagged photos, check-ins, or posts mentioning local businesses and landmarks.
Social media investigation complements traditional investigative methods like skip tracing and asset searches. While skip tracing provides current addresses, phone numbers, and employment data, and asset searches identify property and vehicle ownership through official records, social media investigation reveals the lifestyle context that connects these data points â showing how a person actually lives, what they spend money on, who they associate with, and whether their public claims match their private reality. When combined with professional investigative services, social media findings create a comprehensive picture that strengthens legal cases and improves recovery outcomes.
For fraud investigations specifically, social media is often where the case breaks open. Our comprehensive fraud investigation guide covers the full investigation process, but social media analysis frequently provides the critical leads that forensic accountants and attorneys need to trace hidden assets, identify co-conspirators, and build the evidentiary foundation for successful legal action. The information people voluntarily share online about their purchases, travel, lifestyle, business activities, and relationships creates a digital trail that even the most careful fraudster finds difficult to completely eliminate.
Legal Boundaries & Ethical Guidelines
Before conducting any social media investigation, understanding the legal and ethical boundaries is essential â both to protect the admissibility of evidence you discover and to avoid civil or criminal liability for investigation methods that cross legal lines. The rules are generally straightforward, but violations can have serious consequences including evidence suppression, sanctions, professional discipline, and even criminal prosecution. âī¸
â What You CAN Do Legally
đ View publicly available content. Any content that is publicly accessible on social media platforms â meaning content visible to anyone without logging in or without being connected to the account holder â is generally fair game for investigation purposes. This includes public posts, photos, videos, comments, likes, check-ins, reviews, and profile information that the user has chosen to make publicly visible. Courts have consistently held that individuals have no reasonable expectation of privacy in content they voluntarily post to the public internet.
đ Search using publicly available tools. Using search engines, platform search functions, and publicly available OSINT (Open Source Intelligence) tools to find social media accounts and content associated with investigation targets is legal and widely accepted. This includes searching by name, username, email address, phone number, and other identifying information to locate accounts across multiple platforms.
đ Preserve and document findings. Taking screenshots, saving web pages, printing content, and documenting the URL, date, and time of discovery is not only legal but essential for creating admissible evidence. Thorough documentation of publicly available content you discover during investigation is a core investigative practice that courts expect and appreciate.
đĢ What You CANNOT Do
đĢ Create fake profiles to deceive targets. Creating fictitious social media accounts for the purpose of connecting with investigation targets under false pretenses is ethically problematic and potentially illegal. This practice may violate the Computer Fraud and Abuse Act (CFAA), state fraud and deception statutes, attorney ethical rules (particularly for lawyers and their agents), and platform terms of service. Evidence obtained through deceptive means may be excluded from court proceedings and could expose the investigator to civil liability or criminal charges. If the target’s accounts are private, use legitimate legal processes such as discovery requests, subpoenas, or court orders to obtain the content you need.
đĢ Access private accounts without authorization. Logging into someone else’s social media account, guessing or cracking their password, exploiting security vulnerabilities, or using someone else’s credentials to access private content constitutes unauthorized computer access â a federal crime under the CFAA and a crime under most state computer fraud statutes. This prohibition applies regardless of your reason for accessing the account and regardless of whether the target is suspected of wrongdoing.
đĢ Harass, stalk, or intimidate through social media. Using social media to contact, follow, message, or monitor an investigation target in a manner that constitutes harassment, stalking, or intimidation violates both criminal statutes and civil tort law. Investigation should be passive observation of public content â not active engagement with the target or their network.
When in Doubt, Use Legal Process
If the evidence you need is behind privacy settings or in private messages, the legal path is through formal discovery â subpoenas to the platform, interrogatories to the opposing party, or court orders compelling disclosure. This approach is slower but produces legally bulletproof evidence that no opposing attorney can challenge on admissibility grounds. Consult with your attorney about the best approach for your specific case.
Finding Someone’s Social Media Accounts
The first challenge in social media investigation is identifying all accounts associated with the target. People often maintain accounts on multiple platforms, may use different names or handles on different platforms, and may have accounts you don’t expect based on their demographic profile. A thorough investigation identifies every active account to ensure no evidence is missed. đ
đ§ Search by Known Identifiers
Start with what you know. If you have the target’s full name, email address, phone number, or username on any platform, use these identifiers to search across all major social media platforms. Many platforms allow searching by email or phone number (depending on the target’s privacy settings). A single confirmed username often leads to accounts on other platforms where the same username is used. Professional skip tracing services can provide phone numbers, email addresses, and associated identifiers that serve as starting points for social media account discovery â results delivered in 24 hours or less.
đŧī¸ Reverse Image Searches
If you have a photograph of the target (from a previous investigation, public records, professional directory, or known social media account), reverse image search tools can identify other locations on the internet where that image appears â potentially revealing additional social media accounts, professional profiles, dating profiles, and forum accounts the target maintains. This technique is particularly effective because people frequently use the same profile photo or personal photos across multiple platforms.
đĨ Network Analysis
Examining the public social media accounts of the target’s known associates â family members, business partners, colleagues, and friends â often reveals the target’s accounts through tags, mentions, comments, shared posts, and friend/follower lists. If the target has limited public presence under their own name, they may appear frequently in the posts and photos of people in their social and professional network. This approach is particularly valuable for locating people who have changed their name or who use pseudonyms online.
đ Username OSINT Tools
Specialized OSINT tools search hundreds of platforms simultaneously for a given username, email address, or phone number. These tools automate the process of checking each platform individually and can identify accounts on niche platforms, forums, and services that manual searching would miss. While many of these tools are freely available, professional investigators typically have access to more comprehensive tools and databases that produce more thorough results.
People Often Have More Accounts Than You Expect
The average person maintains accounts on 6-8 social media platforms. Investigation targets who are deliberately hiding information may also have secondary accounts under aliases, alternate names, or nicknames. Don’t stop searching after finding one or two accounts â continue until you’ve checked all major platforms and exhausted your available identifiers.
Need Professional Investigation Support?
Our skip tracing provides the identifiers you need to find social media accounts â names, email addresses, phone numbers, and associates. Asset searches confirm what social media reveals. Results in 24 hours or less.
Platform-by-Platform Investigation Guide
Each social media platform offers different types of investigative intelligence and has different privacy configurations, search capabilities, and content types. Understanding what each platform can reveal â and its limitations â helps investigators prioritize their efforts and ensure thorough coverage. đ
đ Facebook & Meta Platforms
Facebook remains the richest single source of investigative intelligence due to its massive user base, detailed personal profiles, and wide variety of content types. Public Facebook profiles may reveal current city, workplace, education history, relationship status, family members, friend lists, group memberships, event attendance, check-ins at businesses and locations, posts, comments, photos with tags and location data, marketplace listings (revealing assets for sale), life events (marriages, moves, job changes), and political and religious affiliations. Facebook’s Marketplace feature is particularly valuable for asset investigations â people selling vehicles, furniture, electronics, or other property often reveal ownership of those assets. Instagram (also owned by Meta) is especially valuable for lifestyle documentation â photos and videos of travel, purchases, dining, and activities that may contradict claims of financial hardship.
đŧ LinkedIn
LinkedIn is the primary platform for professional and business investigation. Public LinkedIn profiles reveal current employment (employer, title, start date), complete employment history, education and credentials, professional connections, group memberships, published articles and posts, skills and endorsements, and recommendations from colleagues. For business partner investigations, pre-litigation research, and employer identification for wage garnishment, LinkedIn is often the first and most productive platform to check. Investigators can identify current employers, verify claimed credentials, discover undisclosed business interests, and map professional relationships without revealing their identity to the target.
đĻ X (Formerly Twitter)
X provides real-time insight into a target’s thoughts, opinions, activities, and interactions. Posts are largely public by default, making X one of the most accessible platforms for investigation. Valuable investigation intelligence includes real-time posts about activities, locations, and events; interactions with other users revealing relationships and associations; retweets and likes showing interests and affiliations; and the timestamp data on posts that can establish presence in a specific location at a specific time. X’s search function allows searching an individual’s post history for specific keywords, dates, and topics.
đ Location-Based Platforms
Platforms like Google Reviews, Yelp, Foursquare/Swarm, and Nextdoor reveal location-based activity that can establish where a person lives, works, eats, shops, and travels. Google Reviews are particularly valuable because people often review businesses near their home or workplace, inadvertently establishing their geographic location even when other social media accounts reveal little. Nextdoor requires neighborhood verification, so an active Nextdoor profile can confirm a target’s residential area even when they’ve attempted to conceal their address. These location signals complement professional skip tracing by providing independent verification of address information.
đ¸ Visual & Video Platforms
YouTube, TikTok, Pinterest, and Snapchat (through Snap Map and public stories) provide visual evidence that can be extremely powerful in legal proceedings. Video content is particularly persuasive â a debtor claiming poverty who posts TikTok videos from luxury vacations, or a disability claimant who shares YouTube videos of physical activities, creates compelling evidence that is difficult to explain away in court. Pinterest boards may reveal interests, planned purchases, and aspirational lifestyle indicators. Even the backgrounds of casual videos and photos can reveal location, property, vehicles, and other investigative intelligence.
đŦ Other Platforms Worth Checking
Depending on the investigation, additional platforms to check include Reddit (anonymous but potentially revealing posts about personal financial situations, legal questions, and personal problems), Venmo (public payment transactions that reveal relationships and spending activities), dating apps (profiles that may reveal a different lifestyle, income level, or relationship status than publicly claimed), gaming platforms (which may show expensive purchases, significant time investment, and social connections), and niche forums or community platforms related to the target’s known interests or profession.
Professional and hobby-specific platforms deserve particular attention because people tend to be less guarded in specialized communities where they assume only fellow enthusiasts are watching. Car enthusiast forums reveal vehicle ownership and modifications. Real estate investment forums may show undisclosed property holdings. Fitness tracking apps with public profiles show activity levels relevant to disability claims. Boating, aviation, and motorsport communities reveal expensive asset ownership. Collector communities (watches, art, coins, wine) can expose significant undisclosed wealth. Even review platforms like Yelp and Google Maps can reveal travel patterns, dining habits, and geographic location through restaurant and business reviews.
For judgment collection cases specifically, social media investigation is most powerful when combined with formal collection tools. Evidence of hidden assets discovered on social media supports motions for debtor examinations where the debtor can be questioned under oath about the assets you’ve already documented. Photos of luxury lifestyles contradict claims of inability to pay during judgment enforcement proceedings. And evidence of asset concealment â like social media posts showing a debtor enjoying property they’ve nominally transferred to someone else â supports fraudulent conveyance claims to claw back those assets for satisfaction of the judgment.
What Evidence to Look For
Effective social media investigation requires knowing what you’re looking for â not just browsing randomly through someone’s posts. Each type of legal case demands different types of social media evidence, and experienced investigators focus their efforts on the content most likely to produce actionable intelligence. đ
đ° Asset & Lifestyle Evidence (Judgment Collection & Fraud)
For judgment collection and fraud investigation, focus on social media content that reveals undisclosed assets and contradicts claims of inability to pay. This includes photos and videos of luxury purchases (vehicles, jewelry, electronics, designer goods), travel and vacation documentation (flights, hotels, resorts, cruises), real estate content (home tours, renovation projects, property photos), dining and entertainment spending, and any content suggesting income sources not disclosed in financial declarations. A debtor who claims to be judgment-proof during a debtor examination but posts Instagram photos of a new car or vacation home creates powerful impeachment evidence that can expose perjury and lead to expanded collection remedies.
đ Location & Movement Evidence
For investigations involving missing persons, disappeared debtors, or people who have moved out of state, social media can reveal current location through geotagged photos and posts (many platforms embed GPS coordinates in photos by default), check-ins at local businesses and venues, posts referencing specific locations, weather, or local events, interaction with local businesses and organizations, and tagged locations in stories and temporary posts. Even indirect evidence â like reviewing at a local restaurant, commenting on neighborhood group posts, or appearing in the background of other people’s photos â can establish geographic location for service of process or jurisdictional purposes.
đ¤ Relationship & Association Evidence
Social media reveals relationships and associations that formal records may not capture. For business partner investigations, identify undisclosed relationships with competitors, vendors, or other business interests. For fraudulent transfer investigations, map the target’s family members and close associates who may be holding transferred assets. Friend lists, follower/following relationships, tagged photos, shared events, mutual connections, and interaction patterns all reveal the social and professional networks that help investigators understand the full scope of a scheme.
đ Contradictory Statement Evidence
Some of the most valuable social media evidence consists of statements, posts, or content that directly contradict claims the target has made in legal proceedings, business dealings, or formal declarations. Insurance fraud investigations frequently uncover social media evidence of physical activities that contradict disability claims. Financial fraud cases may reveal lifestyle spending that contradicts claimed losses. Family law cases may produce evidence of hidden income, undisclosed relationships, or parenting behaviors inconsistent with custody claims. This contradictory evidence is powerfully persuasive in court because it comes directly from the target’s own voluntary statements.
Social Media Tells a Story Over Time
Individual posts may have limited evidentiary value, but patterns across multiple posts over time build a compelling narrative. A single photo of a nice dinner doesn’t prove wealth. But months of photos showing luxury dining, travel, expensive purchases, and a lifestyle inconsistent with claimed financial hardship creates a body of evidence that is very difficult to rebut. Document everything chronologically and look for patterns rather than isolated incidents.
Preserving Social Media Evidence for Court
Discovering evidence is only half the battle â preserving it in a manner that ensures admissibility in court is equally critical. Social media content is inherently ephemeral: posts can be deleted, profiles can be deactivated, privacy settings can be changed, and stories disappear automatically. If you don’t preserve evidence immediately upon discovery, it may be permanently lost by the time you need it for litigation. đž
đ¸ Screenshot Documentation
For every piece of social media evidence you discover, immediately capture a full-screen screenshot that includes the browser URL bar (showing the complete web address), the date and time visible on your device, the post content in its entirety (scroll and capture if necessary), the author’s profile name and username, any comments, likes, or engagement metrics visible, and the platform’s interface elements that authenticate the content. Screenshots should be unedited and unaltered. Do not crop, annotate, highlight, or modify screenshots intended as evidence. Save originals in a dedicated, organized folder with filenames that include the date, platform, and a brief description of the content.
đ URL & Metadata Documentation
For each piece of evidence, record the complete URL of the post or profile page, the date and time you accessed and captured the content, the platform and the author’s username and profile URL, a description of what the content shows and its relevance to the investigation, and the name of the person who captured the evidence. This metadata documentation creates a chain of custody record that supports the authenticity of the evidence if challenged in court. Without this documentation, opposing counsel may argue that the screenshots are fabricated, altered, or taken out of context.
đ Advanced Preservation Methods
For critical evidence, go beyond simple screenshots. Save the webpage source code (right-click â “View Page Source” â save), use web archiving services that create timestamped, verifiable records of web page content, create PDF printouts of pages that capture the full layout and metadata, and download videos and images at their original resolution before they can be deleted. For the highest level of authentication, professional forensic preservation services create sworn affidavits attesting to the content, date, and method of capture â making the evidence virtually impossible to challenge on authenticity grounds.
Preserve First, Analyze Later
When you discover potentially relevant social media content, your first action should always be preservation â not analysis, not sharing, not discussing. Content can be deleted at any moment. Capture comprehensive screenshots of everything you find, including surrounding context, before spending time evaluating its significance. You can analyze and organize preserved evidence later, but you cannot capture evidence that has been deleted.
Advanced OSINT Techniques
Open Source Intelligence (OSINT) extends far beyond browsing someone’s social media profile. Advanced OSINT techniques leverage publicly available data in sophisticated ways to build comprehensive intelligence profiles, discover hidden connections, and uncover information that casual investigation would miss. These techniques, when combined with professional skip tracing and asset search results, create a powerful investigative capability. đ ī¸
đ Cross-Platform Correlation
Information fragments from different platforms often combine to reveal much more than any single platform shows alone. A username on Twitter may match a Reddit account that discusses personal financial details. A LinkedIn employment history may connect to a Facebook post about a side business. An Instagram photo’s metadata may reveal GPS coordinates that match a property identified through real property searches. Systematically correlating information across platforms transforms individual data points into comprehensive intelligence profiles that reveal the target’s complete digital footprint.
đ Historical Content Analysis
Web archiving services like the Internet Wayback Machine capture historical snapshots of web pages, including social media profiles that have since been changed or deleted. By reviewing historical captures of a target’s social media profiles, investigators can identify content that has been deliberately removed â which is often the most revealing content of all. If a debtor deleted posts about luxury purchases before a debtor examination, historical archives may still contain that evidence. The deletion itself becomes additional evidence of consciousness of guilt or intent to deceive.
đŧī¸ Image Intelligence (IMINT)
Photos and videos posted on social media contain layers of intelligence beyond what’s visible to the casual viewer. EXIF metadata embedded in photos may include GPS coordinates, camera model, date and time, and editing software used. Background elements in photos and videos can reveal locations, properties, vehicles, and other people present. Reflections in mirrors, windows, and shiny surfaces occasionally capture additional context. Photo comparison across multiple posts can establish timelines, track location changes, and identify vehicles, properties, and possessions. Even when EXIF data has been stripped by the platform, visual analysis of the content itself remains highly valuable.
đ Network Mapping
Building a visual map of the target’s social connections â who they interact with most frequently, who tags them in posts, whose posts they comment on, who shares their content, and who appears in their photos â reveals the social and professional network that may be involved in or aware of the activities under investigation. Network mapping is particularly valuable for fraud investigations where identifying co-conspirators and associates who may be holding transferred assets is essential. Professional investigators combine social media network mapping with skip tracing data to identify the real-world identities and addresses of key network members.
đ Change Monitoring
Setting up monitoring for changes to a target’s social media presence provides ongoing intelligence throughout an investigation or litigation. Changes to profile information (new employers, new locations, relationship status changes), sudden increases or decreases in posting frequency, deletion of content or deactivation of accounts, and the creation of new accounts under different names can all indicate that the target is aware of the investigation and is taking steps to conceal information. Change monitoring is especially important in long-running collection cases where a judgment debtor’s circumstances may improve over time â when they start a new job, purchase property, or otherwise acquire assets, their social media often reflects the change before official records do.
For attorneys and creditors pursuing judgment collection, ongoing social media monitoring serves as an early warning system for changes in a debtor’s financial status. A debtor who was previously judgment-proof may signal improving circumstances through LinkedIn job updates, new home photos on Instagram, vehicle purchases posted to Facebook Marketplace, or lifestyle upgrades documented across multiple platforms. When these signals appear, it’s time to conduct an updated asset search to confirm the target’s improved circumstances and then move quickly with enforcement tools like judgment liens, wage garnishment, or asset levies while the newly acquired assets are still accessible.
đ Digital Footprint Reconstruction
Even when a target has deleted their social media accounts or scrubbed their online presence, traces often remain across the internet. Cached pages in search engines, archived versions of websites, embedded social media widgets on third-party sites, screenshots shared by other users, news articles or blog posts referencing the target, and data broker aggregation sites all preserve fragments of digital activity that can be reconstructed into a useful intelligence picture. Professional investigators experienced in OSINT techniques know where to look for these digital remnants and how to piece them together into coherent evidence even when the original source has been removed. This capability is particularly valuable when investigating targets who have attempted to erase their digital footprint after becoming aware of legal proceedings.
Real-World Investigation Scenarios
đ Scenario 1: The “Judgment-Proof” Debtor
An attorney holds a $75,000 judgment against a former contractor who claimed during his debtor examination to have no assets, no income, and no ability to pay. A skip trace confirmed his current address, and a routine check of his publicly visible Instagram account revealed a different story entirely: photos of a recently purchased fishing boat, weekend trips to a lakeside cabin, and a new truck parked in the driveway of a home not reflected in official records. An asset search confirmed the boat and truck were registered to his girlfriend’s name â a classic fraudulent transfer pattern. Armed with this evidence, the attorney filed a motion for contempt based on the debtor’s false testimony and a fraudulent conveyance action to claw back the assets, ultimately recovering the full judgment plus attorney fees.
đ Scenario 2: Locating a Missing Business Partner
A small business owner discovered that his business partner had systematically diverted $180,000 in company revenue over 18 months before disappearing without notice. Traditional search methods produced no results â the partner had abandoned his apartment, disconnected his phone, and left no forwarding address. However, a social media investigation revealed that the partner’s sister had publicly tagged him in a Facebook post from a restaurant in Boise, Idaho. A professional skip trace confirmed a new address in Boise within 24 hours. A real property search showed he had purchased a condo using funds traceable to the diverted revenue. The victim filed suit in Idaho, obtained a prejudgment attachment on the condo, and ultimately recovered $145,000 through settlement.
đ Scenario 3: Insurance Fraud Discovery
An insurance carrier suspected that a claimant receiving disability benefits for a severe back injury was exaggerating his limitations. The claimant’s public TikTok account â discovered through a username search linked to his known email address â contained dozens of videos showing him performing home renovation projects, lifting heavy materials, and operating power tools with no apparent discomfort. When confronted with this evidence during an independent medical examination, the claimant’s benefits were terminated and the carrier initiated a fraud recovery action for over $95,000 in benefits already paid. The preserved social media evidence â properly documented with timestamps, URLs, and screenshots â proved decisive in both the administrative proceeding and the subsequent civil fraud litigation.
đ Professional Investigation Services
Our skip tracing and asset search services complement your social media investigation with verified addresses, phone numbers, employment data, and property records. Over 20 years of experience. Results in 24 hours or less.
Order Skip Trace & Asset Search âFrequently Asked Questions
â Is social media investigation legal?
+Viewing publicly available social media content is generally legal. However, creating fake profiles to connect with investigation targets, accessing private accounts without authorization, and certain deceptive practices may violate laws including the Computer Fraud and Abuse Act, state privacy statutes, and platform terms of service. Always limit your investigation to publicly visible content and consult an attorney if you need access to private content â the proper route is through formal legal discovery processes like subpoenas.
â Can social media evidence be used in court?
+Yes â social media evidence is regularly admitted in civil and criminal proceedings across all jurisdictions. The key requirements are authentication (proving the content is genuine and attributable to the claimed author), relevance to the issues in the case, and proper preservation with documentation of the URL, date of capture, and method of preservation. Evidence obtained through illegal means (such as unauthorized account access) may be excluded, which is why operating within legal boundaries during investigation is so important.
â How do I preserve social media evidence?
+Capture full-page screenshots including the URL bar and timestamp. Save the page source code. Use web archiving tools for timestamped records. Document the account URL, username, and exact date and time of capture. For critical evidence in active litigation, consider professional forensic preservation services that provide sworn affidavits of authenticity. Always preserve first and analyze later â content can be deleted at any moment.
â What can social media reveal in an investigation?
+Social media can reveal current location and address, employment and income, lifestyle and spending habits, hidden assets (property, vehicles, luxury purchases), relationships and associates, travel patterns and location history, business activities and undisclosed interests, and statements that contradict claims made in legal proceedings. Combined with skip tracing and asset search results, social media provides the lifestyle context that connects official records to real-world behavior.
â Can I create a fake account to investigate someone?
+This is strongly discouraged and potentially illegal. Creating fake profiles to connect with investigation targets may violate the Computer Fraud and Abuse Act, state fraud statutes, attorney ethical rules, and platform terms of service. Evidence obtained through deceptive means may be inadmissible in court and could expose you to civil liability. Stick to publicly available information and use formal legal discovery processes for private content.
â How do investigators find someone’s social media accounts?
+Professional investigators use multiple methods including name and username searches across all major platforms, email address lookups, phone number searches, reverse image searches using known photos, OSINT tools that aggregate digital footprints across hundreds of platforms, network analysis (searching associates’ public accounts for tags and mentions), and professional skip tracing databases that cross-reference online identities with verified real-world information.
Related Investigation Resources
đ Disclaimer
This guide is provided for educational and informational purposes only and does not constitute legal advice. Social media investigation involves complex legal and ethical considerations that vary by jurisdiction. Always consult with an attorney licensed in your state before conducting investigations or using social media evidence in legal proceedings. People Locator Skip Tracing provides investigative and asset search services â we do not provide legal advice or legal representation. Information current as of 2026.
