Case Study: Cyber Stalking and Online Harassment
Unmasking Anonymous Attacker Through Social Media Forensics
Executive Summary
Challenge: Professional photographer received 8 months of escalating online harassment across Instagram, Twitter, and email. Anonymous accounts posted defamatory reviews, sent threatening messages, and contacted clients with false allegations. Suspect: ex-boyfriend. Attorney needed evidence for restraining order and defamation lawsuit.
Solution: OSINT investigation combining social media forensics, writing style analysis, metadata extraction, and temporal pattern correlation to link 7 anonymous accounts to suspect through unique identifiers and behavioral patterns.
Results: Documented 12 unique technical and behavioral indicators linking anonymous accounts to suspect. Attorney filed successful restraining order with 95-page evidence package. Suspect admitted harassment in settlement negotiations. Client received $75K damages + public retraction.
Timeline: 8 days from engagement to court-ready evidence package
Background
Client Situation
- Client: Professional photographer (small business owner, female, age 34)
- Harassment Duration: 8 months (escalating pattern)
- Channels: Instagram (4 accounts), Twitter (2 accounts), Email (1 address), Yelp (reviews)
- Content: Threats, defamation, client interference, revenge porn threats
- Impact: Lost 6 clients ($40K revenue), reputation damage, emotional distress
Harassment Pattern
- Initial Phase (Month 1-2): Angry messages on Instagram, deleted comments on posts
- Escalation Phase (Month 3-5): New fake accounts, threats to release "photos," contact with clients
- Defamation Phase (Month 6-8): Negative Yelp reviews, Twitter threads, email to wedding venues
Suspect Profile
- Relationship: Ex-boyfriend (dated 18 months, ended 10 months before harassment began)
- Breakup Context: Client initiated breakup, suspect did not accept
- Known Behavior: Possessive during relationship, monitored client's social media
- Initial Evidence: Timing (harassment started 2 months post-breakup), knowledge of client's personal details
Attorney Engagement
- Objectives: Restraining order, defamation lawsuit, potential criminal charges
- Evidence Needed: Link anonymous accounts to suspect (beyond reasonable doubt)
- Challenges: Sophisticated OpSec (VPN usage, burner emails, fake names)
- Timeline: 2 weeks to restraining order hearing
Investigation Approach
Phase 1: Account Enumeration and Timeline Analysis (Days 1-2)
Objective: Map all harassment accounts and establish temporal patterns
Methods:
- Platform-specific account discovery (Instagram, Twitter, Yelp, email)
- Creation date analysis (archived versions, registration timestamps)
- Activity pattern correlation (time-of-day, day-of-week)
- Harassment escalation timeline
Findings:
Account Inventory:
| Platform | Username | Created | Last Active | Posts/Messages |
|---|---|---|---|---|
| @photo_truth_2024 | 2 months post-breakup | Active | 45 comments, 12 DMs | |
| @exposing_frauds_photo | 3 months post-breakup | Active | 28 comments, 8 DMs | |
| @wedding_scam_alert | 5 months post-breakup | Active | 34 comments, 15 DMs | |
| @truthabout_photographers | 7 months post-breakup | Active | 22 comments, 6 DMs | |
| @PhotoScamWatch | 4 months post-breakup | Active | 67 tweets, 23 threads | |
| @WeddingPhotAlert | 6 months post-breakup | Active | 89 tweets, 31 threads | |
| photoscamreports@protonmail.com | Unknown | Receiving | 5 emails to clients | |
| Yelp | "Disappointed Bride" | 7 months post-breakup | Inactive | 3 reviews |
Temporal Pattern:
- Creation Burst: 4 accounts created within 2-week period (Month 4-5 post-breakup)
- Activity Timing: 90% of posts between 8 PM - 11 PM EST (suspect's known time zone and evening routine)
- Day Pattern: Increased activity on weekends (when suspect had free time)
- Holiday Correlation: No activity on Thanksgiving, Christmas (when suspect traveled - confirmed via mutual friends)
Evidence Strength: MEDIUM - Circumstantial timing but highly correlated
Phase 2: Linguistic and Writing Style Analysis (Days 2-4)
Objective: Identify unique writing patterns, vocabulary, and linguistic signatures
Methods:
- Writing style consistency analysis across accounts
- Vocabulary overlap detection
- Grammar/spelling error pattern matching
- Phrase repetition analysis
- Comparison with suspect's known social media posts
Findings:
Unique Linguistic Markers:
-
Misspelling Pattern: "rediculous" (instead of "ridiculous")
- Found in 6 of 7 anonymous accounts
- Found in suspect's Facebook posts (3 instances over 2 years)
- Match Rate: 85% (rare misspelling)
-
Phrase Repetition: "so-called professional"
- Used in 5 anonymous accounts
- Used in suspect's LinkedIn posts (2 instances)
- Used in suspect's Yelp reviews of other businesses (1 instance)
- Match Rate: 70%
-
Grammar Pattern: Overuse of ellipsis "..." for dramatic effect
- Average 3.2 per post across anonymous accounts
- Suspect's Facebook posts: Average 2.8 per post
- General population: <1 per post
- Match Rate: Highly distinctive
-
Vocabulary Similarity:
- 47 unique words used across anonymous accounts AND suspect's social media
- 12 rare words (e.g., "charlatan," "duplicitous," "hoodwinked")
- TF-IDF analysis: 89% similarity score
Writing Style Metrics:
- Average Sentence Length: Anonymous (14.2 words) vs. Suspect (13.8 words) - Close match
- Punctuation Frequency: Both use excessive exclamation points (2.1 per post)
- Capitalization: Both overuse ALL CAPS for emphasis (18% of posts)
Evidence Strength: STRONG - Multiple unique linguistic signatures with high match rates
Phase 3: Metadata and Technical Forensics (Days 4-5)
Objective: Extract metadata from posts, images, and documents
Methods:
- Image metadata extraction (EXIF data)
- Screenshot metadata analysis
- Embedded location data recovery
- Device fingerprinting (if available)
Findings:
Image Metadata Analysis:
Anonymous Instagram Post (@ exposing_frauds_photo):
- Image: "Proof of scam" - screenshot of client's wedding contract
- EXIF Data:
- Camera: iPhone 12 Pro
- Software: iOS 15.6
- GPS Coordinates: Removed (manually stripped)
- Timestamp: 2024-03-15 20:34:12 EST
- Unique Device ID: Hashed but consistent across 3 images
Cross-Reference with Suspect:
- Suspect's Instagram (personal account): iPhone 12 Pro confirmed in multiple posts
- iOS version: 15.6 matches suspect's phone (confirmed via iMessage reactions)
- Device ID hash: Matches 2 images posted from suspect's personal account (same phone)
Evidence Strength: CRITICAL - Device fingerprint match
Screenshot Forensics:
Several anonymous accounts posted screenshots of client's private messages (claimed to be "evidence")
Analysis:
- Font rendering: MacOS system font (San Francisco)
- Screen resolution: 2880x1800 (MacBook Pro 15" Retina)
- Timestamp format: 12-hour format with EST timezone
- Battery icon style: MacOS Monterey (specific version)
Suspect's Known Devices:
- MacBook Pro 15" (2019) - Confirmed via LinkedIn "posted from" metadata
- Operating System: MacOS Monterey - Confirmed via iCloud Photo Library metadata leaks
Evidence Strength: STRONG - Device and OS match
Phase 4: Social Network Analysis and Connection Mapping (Days 5-6)
Objective: Identify hidden connections between anonymous accounts and suspect
Methods:
- Follower/following analysis (mutual connections)
- Engagement pattern analysis (likes, comments, retweets)
- Account interaction timeline
- Network visualization
Findings:
Instagram Follower Analysis:
@photo_truth_2024 (Anonymous Account #1):
- Followed 23 accounts initially
- 12 accounts are mutual friends of client and suspect
- Pattern: Only followed these accounts after they posted photos with client
- Timing: Followed within 24 hours of each person posting with client
@exposing_frauds_photo (Anonymous Account #2):
- Followed 18 accounts
- 9 accounts are wedding vendors client works with regularly
- Pattern: Followed vendors immediately after client tagged them in Instagram posts
- Knowledge: Only suspect would know specific vendor relationships
Twitter Interaction Pattern:
@PhotoScamWatch:
- Retweeted 47 accounts
- 8 accounts are suspect's known friends/colleagues
- Never retweeted any accounts client follows (avoiding obvious connection)
- Engagement timing: Retweeted suspect's personal account once (immediately deleted - cached version recovered)
Network Map Discovery:
- Anonymous Account #3 (@wedding_scam_alert) followed Anonymous Account #1 (@photo_truth_2024) within 1 hour of creation
- Pattern suggests same operator (forgot to hide connection)
- Both accounts used identical bios: "Exposing Wedding Photography Scams in [City]"
Evidence Strength: STRONG - Network patterns show operational security failures
Phase 5: Temporal Correlation and Behavioral Analysis (Days 6-8)
Objective: Correlate harassment activity with suspect's known schedule and life events
Methods:
- Activity timeline vs. suspect's known schedule (work, travel, social events)
- Cross-platform simultaneity analysis
- Event-driven harassment spikes
- Silence period correlation
Findings:
Activity Correlation with Suspect's Life:
Work Schedule:
- Suspect works 9-5 (confirmed via LinkedIn)
- Anonymous account activity: Near-zero during 9-5 (99% outside work hours)
- Lunch break pattern: Brief activity spikes at 12:30-1 PM (suspect's known lunch time)
Travel/Absence:
- Thanksgiving 2024: Suspect traveled to parents (Ohio) - Zero harassment activity for 4 days
- Christmas 2024: Suspect abroad (Europe trip per Instagram geotag) - Zero harassment activity for 10 days
- Conference 2025: Suspect attended industry conference (Vegas) - Harassment paused 3 days
Breakup Anniversary:
- March 10, 2025: 1-year breakup anniversary
- Harassment spike: 23 posts/messages in single day (10x normal volume)
- Content: Emotional, references to "being wronged" and "time wasted"
- Timing: Suspect's known behavioral pattern (emotional on anniversaries)
Client's New Relationship:
- February 14, 2025: Client posted Instagram photo with new partner
- Harassment spike: 45 posts/messages over next week (15x normal volume)
- Content: References to "moving on too fast" and "replacement"
- Emotional tone: Jealousy-driven language
Event-Driven Pattern:
- Client's wedding bookings: Harassment increased within 48 hours of client posting wedding content
- Client's awards/recognition: Harassment spiked after client won industry award (suspect knew she submitted)
- Mutual friend interactions: Harassment spiked when mutual friends posted with client
Evidence Strength: CRITICAL - Near-perfect temporal correlation with suspect's schedule and emotional triggers
Phase 6: IP Address and Technical Attribution (Days 7-8)
Objective: Identify IP addresses and technical infrastructure used by harasser
Methods:
- Email header analysis (for direct emails to client and businesses)
- VPN detection and pattern analysis
- ISP correlation with suspect's known location
- Platform metadata extraction (when available)
Findings:
Email Header Analysis:
Email from photoscamreports@protonmail.com:
- Originating IP: 38.12.95.142 (NordVPN exit node - detected)
- Timestamp: 2024-08-15 22:14:06 EST
- VPN Detection: NordVPN US server (common VPN service)
Pattern Analysis:
- All emails sent via VPN (sophisticated OpSec)
- However: VPN server selection pattern revealed geographic preference
- VPN Servers Used: 90% selected "US East" region (closest to suspect's location)
- Timing: Emails sent during suspect's known evening hours (8-11 PM EST)
Platform IP Leakage (Yelp):
Yelp Review ("Disappointed Bride"):
- Posted from: 73.94.XXX.XXX
- ISP: Comcast Cable (residential)
- Geolocation: Suspect's city (5-mile radius)
- Cross-reference: Suspect's known ISP is Comcast (confirmed via data breach)
Instagram IP Pattern:
Instagram does not provide IP logs to users, but client reported harassment to Instagram:
- Instagram Safety Team confirmed: "Accounts show coordinated behavior from same IP range"
- Instagram internal action: Disabled 2 accounts for "inauthentic behavior"
- Implication: Instagram's internal systems detected same-source pattern
Evidence Strength: MEDIUM-STRONG - VPN complicates direct attribution, but patterns + Yelp IP leak significant
Deliverables
Executive Summary for Attorney (6 pages)
- Harassment timeline and escalation pattern
- 12 unique identifiers linking anonymous accounts to suspect
- Evidence strength assessment (technical, behavioral, linguistic)
- Restraining order recommendations
- Defamation lawsuit viability
Technical Reports
1. Account Analysis Report (18 pages)
- Complete account inventory across platforms
- Creation dates and activity patterns
- Temporal correlation with suspect's schedule
- Network connection mapping
2. Linguistic Analysis Report (22 pages)
- Writing style comparison (anonymous vs. suspect)
- Unique misspelling patterns
- Vocabulary overlap analysis
- Phrase repetition documentation
3. Metadata Forensics Report (15 pages)
- Image EXIF data extraction
- Device fingerprinting (iPhone 12 Pro match)
- Screenshot forensics (MacOS indicators)
- Technical attribution summary
4. Behavioral Pattern Report (20 pages)
- Temporal correlation analysis
- Event-driven harassment spikes
- Travel/absence correlation
- Emotional trigger identification
5. IP and Technical Intelligence (12 pages)
- Email header analysis
- VPN detection and pattern analysis
- Yelp IP geolocation
- Platform internal action documentation
Evidence Package for Court
95-Page Comprehensive Report Including:
- Annotated screenshots of all harassment (200+ images)
- Side-by-side writing style comparisons
- Timeline visualizations (harassment vs. suspect's life events)
- Device fingerprint analysis
- Expert declaration on linguistic match probability (89% confidence)
Appendices:
- Archived web pages (all anonymous accounts)
- Email headers (5 threatening emails)
- Instagram/Twitter export data (API pulls where available)
- Yelp review documentation
- Witness statements (2 mutual friends confirming suspect's behavior)
Results & Legal Outcome
Restraining Order Hearing
- Attorney filed: 9 days after receiving OSINT report
- Evidence presented: 95-page report, timeline visualization, linguistic analysis
- Hearing duration: 45 minutes
- Judge's ruling: Granted 3-year restraining order
- Judge's comments: "Overwhelming circumstantial evidence... pattern is unmistakable"
Suspect Response
- Initial denial: "Not me, anyone could have done this"
- After evidence review: Suspect's attorney advised settlement
- Admission: Suspect admitted harassment in settlement negotiations (not public admission)
Settlement Agreement
- Damages: $75,000 payment to client
- Public retraction: Suspect required to post apology on personal social media
- Account deletion: All 7 anonymous accounts permanently deleted
- Non-contact: Permanent restraining order (no expiration)
- Criminal charges avoided: Client agreed not to pursue felony charges in exchange for settlement
Platform Actions
- Instagram: Permanently banned suspect's personal account + 4 anonymous accounts
- Twitter: Suspended 2 anonymous accounts for coordinated harassment
- Yelp: Removed 3 fake reviews, flagged suspect's account
- ProtonMail: Account disabled for terms of service violations
Business Impact for Client
- Reputation recovery: Negative reviews removed, settlement included SEO cleanup
- Client retention: 4 of 6 lost clients returned after settlement announcement
- Revenue recovery: Booked 12 new weddings within 3 months (reputation restored)
- Emotional closure: Restraining order and settlement provided peace of mind
Key Takeaways
For Attorneys
1. Circumstantial Evidence Can Be Overwhelming
- No single "smoking gun" but 12 corroborating indicators
- Temporal correlation + linguistic analysis + device fingerprinting = strong case
- Judges understand statistical improbability of coincidence
2. Emotional Context Matters
- Breakup anniversary harassment spike = emotional fingerprint
- Jealousy-driven content after client's new relationship = motive evidence
- Judges are persuaded by behavioral psychology evidence
3. Platform Cooperation
- Instagram's internal confirmation of "coordinated behavior" was key
- Yelp IP leak provided only direct technical attribution
- Most platforms will cooperate with restraining order requests
Cost-Benefit:
- OSINT Investigation: $8,500
- Settlement Recovery: $75,000
- ROI: 9x return on investigation investment
For Investigators
1. Multi-Modal Evidence
- Technical (metadata, IP) + Linguistic (writing style) + Behavioral (timing) = comprehensive case
- No single evidence type sufficient for sophisticated OpSec
- Operational security failures (network connections) often most revealing
2. Temporal Correlation is Powerful
- Harassment pause during suspect's travel = near-smoking gun
- Activity patterns matching suspect's schedule = strong indicator
- Event-driven spikes (client's new relationship) = emotional fingerprint
3. Linguistic Analysis
- Unique misspellings (e.g., "rediculous") are highly distinctive
- Vocabulary overlap across 7 accounts = same author
- Writing style metrics (sentence length, punctuation) surprisingly consistent
4. Device Fingerprinting
- iPhone EXIF data provided unique device ID match
- MacOS screenshot forensics showed same laptop
- Even with EXIF scrubbing, device patterns leak through
For Victims
1. Evidence Preservation
- Screenshot everything immediately (accounts get deleted)
- Use archive.org and archive.today for web pages
- Document your own schedule/travel (for alibi if needed)
2. Platform Reporting
- Report harassment to platforms immediately
- Platform internal investigations provide corroborating evidence
- Instagram's "coordinated behavior" detection is sophisticated
3. Professional Investigation Value
- OSINT investigation strengthens restraining order application
- Comprehensive evidence package deters suspect (settlement more likely)
- Expert testimony on linguistic analysis persuasive to judges
Technical Methodology
Tools & Techniques
Social Media Forensics:
- Instagram/Twitter archive tools (export data, deleted post recovery)
- Wayback Machine, archive.today for deleted accounts
- Social network analysis (Gephi, NetworkX for visualization)
- Follower/following analysis (automated scraping within ToS)
Linguistic Analysis:
- Text similarity analysis (TF-IDF, cosine similarity)
- Vocabulary overlap detection (Python NLTK)
- Writing style metrics (average sentence length, punctuation frequency)
- Misspelling pattern matching (manual review + regex)
Metadata Forensics:
- EXIF extraction (ExifTool, online analyzers)
- Device fingerprinting (unique IDs in image metadata)
- Screenshot forensics (font rendering, screen resolution)
- Timestamp analysis (timezone correlation)
Temporal Correlation:
- Activity timeline visualization (Python matplotlib)
- Statistical correlation analysis (Pearson correlation coefficient)
- Event-driven spike detection (manual review + automated alerts)
- Silence period mapping (travel, work schedule correlation)
IP and Technical Intelligence:
- Email header analysis (MX Toolbox, Google Admin Toolbox)
- VPN detection (IP reputation databases, known VPN ranges)
- ISP identification (WHOIS, ARIN lookups)
- Geolocation services (MaxMind, IP2Location)
Legal & Ethical Standards
- Public sources only: No illegal access to private accounts
- Platform ToS compliance: Scraping within rate limits and rules
- Privacy laws: No unlawful surveillance or tracking
- Expert standards: Linguistic analysis methods peer-reviewed and court-tested
Conclusion
OSINT investigation successfully linked 7 anonymous harassment accounts to suspect through combination of linguistic analysis, device fingerprinting, temporal correlation, and behavioral patterns. The 95-page evidence package resulted in successful restraining order and $75K settlement within 3 weeks of investigation completion.
Key Success Factors:
✓ Multi-Modal Evidence: 12 unique identifiers across technical, linguistic, and behavioral dimensions
✓ Temporal Correlation: Near-perfect alignment with suspect's schedule and emotional triggers
✓ Device Fingerprinting: iPhone and MacBook metadata provided technical attribution
✓ Linguistic Analysis: 89% similarity score and unique misspelling patterns
✓ Outcome: 3-year restraining order, $75K settlement, business reputation restored
This case study is a composite of common cyber harassment scenarios. Technical methods and linguistic analysis techniques are representative of actual investigations.
GI Consulting | Professional OSINT Investigation Services
jason@giconsulting.com
Need Similar Investigation Services?
Contact us to discuss your OSINT investigation needs. We deliver court-admissible evidence with proven methodologies and exceptional ROI.
