Preserving Social Media Posts as Legally Admissible Evidence
A Practical Guide for Citizens Documenting Threats, Incitement, or Celebration of Political Violence
Public posts on social media can provide valuable evidence of threats or incitement, but only if properly preserved. Plain screenshots are easily challenged as altered or incomplete. The goal is to create verifiable captures that support authentication under the Federal Rules of Evidence (FRE 901), which requires showing the evidence is what you claim it is: typically through metadata, hashes, timestamps, and a documented process.
Why Screenshots Alone Fail
They can be easily edited.
They lack full context (e.g., dynamic loading, replies, timestamps).
No built-in proof of when/where the content existed or that it wasn’t altered later.
Courts routinely question screenshot-only evidence. Stronger methods combine full-page/dynamic capture, cryptographic hashing (e.g., SHA-256), independent corroboration, and chain-of-custody documentation.
Strong Options for Forensic Preservation
WARC/WACZ Files (Excellent for Completeness, Open-Source Standard)
WARC (Web ARChive, ISO 28500) files capture the full HTTP transaction: HTML, assets, JavaScript-rendered content, headers, and server responses. This creates a replayable, self-contained record far superior to images. WACZ is a compressed, packaged version. These are widely used by archives like the Library of Congress and Internet Archive.
Strengths: Handles dynamic social media (threads, infinite scroll, videos); includes server timestamps; replayable in browsers; hard to edit without detection.
Limitations in Court: Not automatically self-authenticating; may still need witness testimony or expert explanation of the capture process. Best paired with hashes and logs.
Recommended Tools for WARC:
ArchiveWeb.page (archiveweb.page) – Free Chrome/Chromium extension or desktop app from the Webrecorder project. One-click recording of sessions; captures dynamic content; exports .warc or .wacz. Replay locally with ReplayWeb.page (replayweb.page). Ideal for individuals.
Browsertrix (webrecorder.net/browsertrix) – Cloud-based automation for multiple URLs or scheduled captures. Free trial; paid tiers (~$30+/month depending on usage).
Tiered Alternatives (2026 Landscape)
High-Evidence Tools (Strong for Litigation – Often with Built-in Affidavits)
Page Vault (page-vault.com): Purpose-built for legal use. Full-page captures of dynamic content, automatic hashing, timestamps, and optional affidavits. Patented remote browsing can help with chain-of-custody. Used by law firms; per-use or subscription pricing. Excellent for federal cases.
Hunchly (hunch.ly): Browser extension that auto-captures every page you visit during an investigation, with timestamps and SHA-256 hashes. Generates court-ready reports. Great for ongoing documentation (~$130/year).
TrueScreen or similar mobile-focused tools: Useful if capturing on phones; some offer certified video/screen recordings.
Free Third-Party Corroboration (Good Supplement)
Archive.today (archive.ph) and Wayback Machine “Save Page Now” (web.archive.org): Create independent, timestamped snapshots. Helpful for showing the content existed publicly but may miss full dynamic elements. Courts sometimes take judicial notice of Wayback but often require extra authentication.
Manual Method (Basic but Defensible with Hashes)
Start a screen recording (free OBS Studio) before navigating—record typing the URL and full interaction.
Use browser tools for context (e.g., console command for title + URL + timestamp). Take full-page screenshots.
Save page as “Webpage, Complete” (HTML + assets).
Immediately hash files:
Windows: certutil -hashfile filename SHA256
macOS/Linux: shasum -a 256 filename
Submit URL to Archive.today and Wayback for third-party copies.
Document everything in a signed log (date/time/timezone, URL, tools, hashes).
Notarized or Expert-Supported Capture (Highest Formality)
Perform any method in front of a notary (or use tools offering affidavits). Print key pages if needed, or have a digital forensics expert certify the package. This strengthens authentication but adds cost/time.
Recommended “Belt and Suspenders” Workflow (Maximum Weight)
Use a dedicated browser profile (no logins to personal accounts). Consider a VPN for privacy.
Start OBS screen recording first.
Capture with ArchiveWeb.page (or Page Vault/Hunchly) → export WACZ/file and generate SHA-256 hash immediately.
Submit URL to Archive.today and Wayback Machine for independent records.
Hash everything (recordings, exports, logs).
Create a chain-of-custody document: your name/contact, exact date/time/timezone, URLs, tools/versions used, all hashes, storage locations.
Store securely (encrypted drive + offsite/ cloud backup with version history).
Preserve first—report to the platform second (platforms often delete content upon report).
This combination provides replayable archives, third-party corroboration, video of the process, cryptographic integrity proof, and documented handling—making challenges much harder.
What to Capture for Each Incident
The full post (text, images, video, embedded media).
Poster’s profile (username, bio, photo, followers, verification status).
Engagement (likes, shares, comments, views at capture time).
Thread context (parent posts, key replies, quotes).
All visible timestamps (post date + your capture date).
Direct URL.
For patterns: Build chronological folders per account, noting escalation, networks, or affiliations. Single posts may be protected speech (”they missed”); patterns of specific incitement or true threats are more actionable.
Legal Framework (U.S. Focus)
Authentication relies on FRE 901 (process/system producing accurate results, often shown via hashes + testimony) and 902 (self-authenticating certified records). Relevance and non-hearsay issues also apply.
Key statutes for threats/incitement:
18 U.S.C. § 871 (threats against President).
18 U.S.C. § 879 (other protected persons).
18 U.S.C. § 373 (solicitation of crime of violence).
Brandenburg v. Ohio standard for incitement (imminent lawless action).
Celebrating violence is often protected; direct threats, specific calls to imminent action, or conspiracy are not. Preserve broadly—prosecutors decide. Rules vary by state/federal jurisdiction; consult an attorney for your case.
Reporting
Federal: FBI (tips.fbi.gov – select Terrorism/Threats), Secret Service field offices (threats to protected persons), DOJ tips.
State/Local: Local FBI office, state AG, or police (attach your evidence package).
Submit preserved package; in-person if possible for high-value evidence.
Operational Security
Dedicated browser/profile only.
Do not engage, like, or reply.
Avoid alerting the poster.
Do not publish evidence publicly before law enforcement review.
Use encrypted storage; consider air-gapped backups for sensitive material.
If documenting many posts, tools like Hunchly help organize without manual errors.



