![Profile Image](https://pbs.twimg.com/profile_images/1480785938804523009/mpSFAW6K_normal.jpg)
Laith Alkhouri @MENAanalyst
6) Because many threat actors use similar or variations of the same user identifiers (user handle, email, phone number), the social media intelligence gathering is many times the first thread in uncovering and extracting further intel beyond the borders of social media confines. — PolitiTweet.org