Why How You Search Matters as Much as What You Find in Social Media Discovery
Introduction
Social media and publicly available online activity have become essential sources of evidence in civil litigation. From personal injury claims and employment disputes to commercial litigation and class actions, courts increasingly encounter social media content as part of the evidentiary record. Legal teams have taken notice. Investment in social media discovery has grown, and the conversation around admissibility, authentication, and preservation has matured considerably in recent years.
Yet for all the attention focused on how to preserve social media content, the more difficult challenge receives far less scrutiny: finding the right content in the first place, and finding it the right way. Preservation tools and services have proliferated. The infrastructure for capturing and documenting social media posts has become more accessible. But the threshold question, whether the right accounts, identities, and activity have been identified through a process that is ethical, controlled, and defensible, remains the most consequential and least discussed step in the process.
A preservation effort built on incomplete or improperly conducted discovery is not a minor procedural gap. It is a strategic vulnerability that reaches beyond the evidence itself. When discovery methodology is challenged, it is counsel’s judgment, not just the exhibit, that comes under scrutiny. The content that was never found cannot be preserved. The identity that was overlooked cannot be authenticated. And discovery conducted without appropriate controls can compromise the case, alert the subject, or create ethical exposure for counsel. Defensible preservation requires defensible discovery.
The Social Media Discovery Problem
Consider how a subject’s online presence actually exists. A plaintiff may use their legal name on one platform, a nickname on another, and a wholly unrelated alias on a third. They may maintain active accounts on mainstream platforms such as Facebook and Instagram while also participating in niche communities, marketplaces, or forums where their activity is publicly available but their identity is not immediately apparent. They may have connected accounts across platforms, secondary accounts maintained for specific purposes, and historical activity that predates their current public-facing profile.
Discovering relevant accounts and activity across this fragmented digital landscape requires more than a name search. It requires structured methodology, applied expertise, and access to a broad range of platforms. The volume of publicly available content is substantial. The variation in how individuals present themselves across different platforms is significant. And the consequences of incomplete discovery are not correctable after the fact.
This is the social media discovery problem. It is not primarily a preservation problem. It is not primarily a technology problem. It is a problem of structured, systematic identification conducted through a controlled and defensible process, and it precedes every other step in the workflow.
Why Informal Search Practices Create Litigation Risk
When attorneys or litigation support staff conduct social media searches informally, several categories of risk emerge simultaneously.
Incompleteness
The first is incompleteness. Without a structured methodology and access to a broad platform landscape, searches are almost certain to miss relevant accounts or activity. The absence of findings does not establish the absence of content; it may simply reflect the limitations of the search.
Inconsistency
The second risk is inconsistency. When searches are conducted without standardized methodology, the results vary based on the skill, experience, and available time of the individual conducting the search. That inconsistency is exploitable. Opposing counsel may challenge not only what was found, but how the search was conducted, who performed it, what platforms were included, and what criteria governed relevance determinations.
Improper Documentation
The third risk is documentation. An informal search produces no record of methodology. Without documentation of how discovery was conducted, counsel cannot demonstrate that the process was reasonable, complete, or defensible. In litigation environments where evidentiary credibility depends on process discipline, the absence of a documented methodology is itself a weakness.
These risks compound in the moments that matter most. The most damaging scenario is not a pretrial motion in limine. It is opposing counsel raising a methodology challenge at a critical juncture in the case, when the cost of an incomplete discovery record is highest and the options for remediation are fewest. Each of these consequences is avoidable through a different approach to the discovery step itself.
How the Search is Conducted is as Important as What is Found
Completeness is only one dimension of defensible discovery. The other is methodology, and it carries equal weight in litigation.
A legal team could locate the correct accounts and still create serious risk through the manner in which the search was conducted. Searching a subject’s social media profiles without proper anonymity controls can alert the subject to the investigation. On certain platforms, viewing a profile leaves a visible trace. A subject who becomes aware of an active search may delete content, modify privacy settings, or take other steps to limit what is publicly accessible. Evidence that existed at the time the matter arose may no longer be available by the time preservation occurs.
 “Searches are conducted anonymously, without interaction with the subject, and without leaving traces that could alert a subject to the investigation.”
The manner of searching also carries ethical implications for counsel. Attorneys are subject to professional responsibility rules that govern contact with represented parties and the use of deception in investigation. Informal searches conducted without clear methodology or appropriate controls can create ambiguity about whether those boundaries were observed. Even when no rule was violated, the absence of a documented process makes it difficult to demonstrate that the search was conducted appropriately.
Beyond alerting and ethics, there is the question of accuracy. Searches conducted hastily or without structured identity verification methodology introduce the risk of false attribution, associating content with the wrong individual or drawing conclusions from accounts that do not belong to the subject. In litigation, a misattributed finding is not merely unhelpful. It is a liability.
“How information is found is as important as how it is preserved.”
SMI Aware controls each of these dimensions as a matter of process. Searches are conducted anonymously. Analysts do not interact with subjects, view profiles in ways that create alerts, or take any action that could signal to a subject that a search is underway. Identity verification follows a structured methodology requiring multiple confirmed identifiers before any account is attributed to a subject. Ethical boundaries are not treated as a secondary concern. They are built into the workflow at every step.
This is what it means to conduct discovery the right way, and it is what distinguishes professional analyst-driven discovery from informal searching or self-serve tools that place the burden of methodology entirely on the user.
Understanding the Distinction: Discovery Versus Preservation
The terms discovery and preservation are sometimes used interchangeably in discussions of social media evidence. They should not be. They describe distinct steps in the workflow, and conflating them creates the conditions for the gaps described above.
Discovery, as used here, refers to the process of identifying relevant identities, accounts, and activity. It involves determining which platforms a subject uses, which accounts are associated with that subject, which aliases or variations are in use, and what publicly available content exists across those accounts. Discovery answers the question: what exists and where is it, and was it found through a process that can be defended?
Preservation refers to the process of capturing and documenting specific content for evidentiary use. It addresses authentication, chain of custody, technical capture, and the structured documentation necessary to support admissibility. Preservation answers the question: how is this content captured and documented in a defensible manner?
Most preservation tools operate on an assumption: that discovery has already occurred, and that it was conducted properly. They are designed to preserve information, not to discover it, and they provide no controls over how the identification step was handled. Many legal teams have invested significantly in preservation infrastructure and that investment is well placed. But preservation tools capture what they are directed to capture. They cannot identify what has not yet been found, and they cannot retroactively correct a discovery process that was incomplete, improperly conducted, or undocumented. A defensible preservation process cannot correct for incomplete or compromised discovery.
The SMI Aware Approach: From Discovery Through Defensible Preservation
SMI Aware was built to address both steps, and both dimensions of the discovery problem. The foundation of every engagement is structured discovery: the systematic identification of relevant accounts, identities, and publicly available activity, conducted anonymously, ethically, and in accordance with a documented methodology, before any preservation work begins. This is not a preliminary formality. It is the core of what professional social media discovery requires.
Full-time, US-based professional analysts conduct each search using SMI Aware’s purpose-built technology and standardized methodology. Analysts evaluate findings for relevance, accuracy, and context. They identify aliases, secondary accounts, and connected profiles across nearly 600 social media and online platforms. Searches are conducted anonymously, without interaction with the subject, and without leaving traces that could alert a subject to the investigation. Identity attribution requires confirmation across multiple verified indicators before any account is associated with a subject of the search.
Their work is not a summary of automated results. It is professional judgment applied to a structured, controlled, and documented discovery process. That combination has earned the trust of 44 of the top 100 Am Law firms, who rely on SMI Aware across matters where methodology, credibility, and evidentiary discipline are non-negotiable.
Once relevant accounts and activity have been identified and reviewed, findings are authenticated and preserved with underlying source code to support defensibility and maintain the digital chain of custody. Reports are structured for attorney review, clearly sourced, and documented with the methodology necessary to support evidentiary use. The entire workflow, from initial discovery through court-ready documentation, is controlled, consistent, and professionally managed.
The Role of Purpose-Built Technology
Technology is a material component of what SMI Aware delivers, but its role is specific. SMI Aware’s proprietary platform enables analysts to search across a broad range of platforms, organize large volumes of content, and support the documentation requirements that litigation demands. It also enforces the anonymity and process controls that protect the integrity of the search itself. It reduces the friction in the process and ensures consistency across engagements.
What technology does not do is substitute for professional judgment. The evaluation of identity attribution, contextual relevance, and the significance of a particular account or piece of content requires analyst expertise. Automated tools produce outputs. Analysts produce findings. The distinction matters in litigation environments where credibility depends on the quality of both the process and the professional who oversaw it.
Purpose-built technology in the hands of trained analysts produces a different result than either element alone. The combination is what enables SMI Aware to deliver defensible discovery at scale, across nearly 600 platforms, with the methodology controls and documentation standards that litigation requires.
Why End-to-End Process Control Matters
In litigation, credibility is cumulative. A single procedural weakness in how evidence was collected can expand into a challenge to the entire evidentiary record. Conversely, consistent process discipline across every step of discovery and preservation builds the foundation that supports admissibility, credibility, and strategic confidence.
When discovery and preservation are handled by different parties, using different tools, with different methodologies and documentation standards, gaps are structurally likely. The handoff between steps creates risk. The inconsistency between approaches creates vulnerability. The absence of a single documented workflow creates an evidentiary record that is harder to defend.
Controlling the full workflow from search through court-ready documentation is not an operational convenience. It is a risk management decision. When one professional team, operating under consistent methodology, manages every step, the result is a defensible record that reflects the discipline the process required.
Conclusion: Defensible Discovery Means Finding the Right Information the Right Way
The conversation about social media evidence in litigation has matured. Courts have developed clearer frameworks for authentication and admissibility. Legal teams have become more sophisticated about preservation requirements. The technology landscape has evolved to support structured capture and documentation.
What has not received equivalent attention is the discovery step that precedes all of this, and specifically, the dual standard that step must meet. Discovery must be complete, reaching the accounts and activity that are actually relevant to the matter. And it must be conducted correctly, through a process that is anonymous, ethical, documented, and structured to protect both the integrity of the evidence and the professional standing of counsel.
How information is found is as important as how it is preserved. Incomplete discovery cannot be corrected downstream. Discovery conducted without appropriate controls can compromise what was found even if the content itself was relevant. And undocumented methodology cannot be defended after the fact.
SMI Aware was built to meet both standards. Our work begins where the evidence begins: with structured, professional discovery that identifies what exists, confirms it accurately, and collects it through a process that can withstand scrutiny at every stage. The result is a defensible record that reflects both the rigor of the process and the expertise of the professionals who conducted it.
For legal teams working through this question, we welcome the conversation. Contact SMI Aware to speak directly with our team about how structured discovery supports the demands of your litigation practice.
