.MKITOS

CTRL ALT ACT – Week 2: Dummy Accounts & Targeting Miscreant Profiles

Welcome to Week 2 of CTRL ALT ACT!

By now, your OSINT basics should be solid. Last week (Week 1) we took a hands-on approach to identifying miscreant accounts—probably using your personal profile. But let’s fix that.

🚫 Why You Shouldn’t Use Personal Accounts

Using your real account for OSINT puts you at risk:

✅ Solution? Dummy Accounts

Most of us already have an anonymous account we use to “stalk” people online (don’t lie 😏). Now, you’ll do just that—but for ethical digital sleuthing, not petty revenge.

🔐 How to Create a Dummy OSINT Account

📺 Video Guide: How To Create Sock Puppet Accounts For OSINT

🎯 Targeting Miscreant Accounts: A Three-Tier System

Let’s break down the kinds of accounts we’ll investigate, in ascending order of risk:

🧱 CATEGORY 1: Fake News Sharing Accounts (Beginner Friendly)

These are accounts/pages that share:

Such content can cause panic or incite hate, even violence.

🛠️ How to Identify Fake News Content

👤 CATEGORY 2: Personal Accounts Spreading Hate

This is where your “stalker mode” comes in—but for the greater good. You're now going to profile individual harassers, especially those targeting vulnerable communities or individuals online.

🪜 How to Investigate

🎥 Video Walkthrough: OSINT on Social media accounts

🧱 CATEGORY 3: Pages & Groups (High-Impact Networks)

These are central hubs for spreading hate, misinformation, illegal media, or even planning coordinated attacks.

They are less about individuals, more about systems.

❗ DO NOT join private groups/forums. Always stick to publicly available info.

🔍 How to Investigate Pages & Groups

  1. Identify suspicious pages
    • Start from fake news posts or abusive content.
    • Check which pages or groups are posting/sharing it.
  2. Find the admins/moderators
    • Many platforms list admins (Facebook, Reddit, Telegram channels).
    • Investigate them as individuals using Category 2 techniques.
    • Admins often manage multiple hate pages — follow the trail.
  3. Analyze posting behavior
    • What content are they sharing?
    • How frequently? Is it coordinated?
    • Do they post in sync with certain events?
  4. Track follower behavior
    • Who are the frequent likers/commenters/sharers?
    • Profile those accounts for network mapping.
    • Use slang, emojis, or hashtags to identify in-group behavior.
  5. Trace reposts and sources
    • Is the content original?
      Use reverse search or metadata tools to trace the origin.
  6. Identify the bigger picture
    • Do multiple pages cross-share content?
    • Are followers overlapping?
    • You may be uncovering an entire misinformation ecosystem.

🧰 Tools to Help

🎯 Goals with Pages/Groups

📩 What To Do With Your Findings?

So, you’ve found the accounts and gathered evidence. Now what?

🚨 Reporting (Always Recommended for Beginners)

📍 For India: https://cybercrime.gov.in

You can even become a volunteer on the portal. Just be sure to read all terms and conditions.

🔮 Beyond Reporting...

We’ve shown you the roadmap—from dummy accounts to miscreant exposure to reporting. But where you go next is entirely your call.

Let’s just say...

🧠 Final Note

Stay safe. Stay ethical. Stay sharp.
Happy hunting.

🎉 Achievement Unlocked: Week 2 Completed – Dummy Accounts & Targeting Miscreant Profiles

🚀 Ready for Week 3?

In the next module, we’ll explore how to uncover hidden and risky websites, spot fraudulent and dangerous sites, and learn techniques to safely investigate them.

Previous: Week 1: OSINT Basics Next: Week 3: Website Recon & Digital Footprints