8 August 2025
0 Comments
Malicious Social Media Posts – Background Investigation in Support of a Defamation Claim
Background
In 2025, our investigative team was instructed to support a client who had been the subject of anonymous defamatory allegations posted within a large Facebook group.
The post, originating from the group Are We Dating The Same Guy, accused the client of inappropriate personal conduct connected to a gym in Warrington. The client requested assistance to:
- Identify the poster of the anonymous allegations
- Provide a detailed background check on an individual named in the post, whose association with the allegations was unclear
- Assess the feasibility of legal action for defamation through attribution of the anonymous Facebook account
Complexity of the Case
The matter was complicated by:
- Anonymous online activity: Facebook group posts were made under the generic “Anonymous” function, obscuring the author.
- Fake profiles: The suspected profile (“Hollie Parkes”) appeared to have been recently created, locked down, and used only for anonymous posting.
- Volume of digital evidence: Review of screenshots, social media platforms, and historic data breaches was required.
- Potential reputational impact: The accusations, although unsubstantiated, could have significant personal consequences for the client.
Approach
Our investigation proceeded through the following stages:
- Analysis of Facebook Group Activity
- Screenshots of the posts and responses were reviewed.
- Investigated possible links between “Anonymous 704,” “Anonymous 481,” and the “Hollie Parkes” Facebook account.
- Attribution Analysis
- Technical attribution techniques (metadata, linked accounts, IP trails) were applied, though these are limited by platform privacy protections.
- Identified that legal disclosure from Facebook would be required to conclusively link the account.
- Background Check – Subject (Natalie Gibbons)
- Conducted comprehensive open-source intelligence (OSINT) on the subject, including:
- Address history
- Social media activity
- Historic data breaches
- Public records
- Online behavioural patterns
- Data Breach and Username Analysis
- Identified historical involvement with dating and adult websites through leaked data.
- Detected use of multiple usernames (e.g., babyboo_boo, rm_babyboo_boo) across platforms.
- Image and Social Media Assessment
- Reverse image searches highlighted possible non-consensual use of the subject’s images on adult websites.
- Reviewed activity on public review platforms, Instagram, and Facebook.
Key Findings
- Identity Attribution:
The anonymous posts could not be definitively attributed to “Hollie Parkes” due to platform privacy restrictions.
The only route to confirmation is via a disclosure order to Facebook under a civil defamation claim.
- Background – Subject:
- No evidence of adverse financial history (no CCJs, IVAs, bankruptcies).
- Social media presence shows high digital activity and multiple historic online identities.
- Data breaches confirmed past activity on several dating platforms (Badoo, Zoosk, AdultFriendFinder).
- No evidence directly linking the subject to the defamatory allegations.
- Gym and Social Media:
A review of the gym’s social media showed no link between the subject and the premises or to the client.
Outcomes
- A comprehensive evidential report was prepared, enabling:
- Legal counsel to advise on next steps for a defamation claim.
- Preparation for a potential Norwich Pharmacal or disclosure order to identify the anonymous Facebook account owner.
- Clear separation of unverified online content from substantiated findings.
- Key Recommendations:
- Legal disclosure application to Facebook if the client proceeds with a defamation case.
- Ongoing monitoring of social media for future activity.
Key Learning
This case demonstrates the importance of digital attribution investigations in defamation and harassment claims.
Where technical attribution is blocked by platform privacy, professional evidence collection supports applications for disclosure orders and ensures claims are backed by admissible documentation.