the home of online investigations

Category: Resources

November 8, 2018

By Daniel Romein

Europol’s Asian City Child Abuse Photographs Geolocated

Since 2017 the European Union Agency of Law Enforcement Cooperation, better known as Europol, has been crowdsourcing parts of or heavily censored photographs, related to child abuse crimes in their “Stop Child Abuse – Trace an Object” campaign. Within two weeks after the start of their campaign Europol received 10.000 contributions from the public. Bellingcat,…

Read Full Post

6

November 1, 2018

By Eliot Higgins

New Bellingcat Workshops Announced for Berlin, London, Washington, and Amsterdam (All workshops now full)

Bellingcat is holding a series of workshops in Europe and the United States in 2018 and early 2019, where participants can learn the tools and methodologies used by Bellingcat in their investigations. Currently 5-day workshops are planned for the following dates: Berlin : November 26-30 (FULL) London : January 14-18 (FULL) Washington, D.C. : January 28-February 1 (FULL)…

Read Full Post

3

October 24, 2018

By Bellingcat Investigation Team

Dali, Warhol, Boshirov: Determining the Time of an Alleged Photograph from Skripal Suspect Chepiga

On 11 October 2014, a Facebook profile to a person named “Ruslan Boshirov” — the cover identity of Skripal poisoner Anatoliy Chepiga — posted a lone photograph of Prague, showing the heavily trafficked Old Town Square and the Astronomical Clock. The upload date of this photograph coincides with a report from the Czech publication Radiožurnal that…

Read Full Post

25

October 22, 2018

By Aiganysh Aidarbekova

Corrupt Latin: How Orthography Revealed Corruption in Kyrgyzstan

In 2013, Russian political activist Alexey Navalny published a blog post in which he exposed a corruption scheme used on state procurement websites. Generally, in public procurement processes, the state customer publishes an advertisement for the purchase of goods or services, and the contractor offering the lowest price wins the tender and delivers the goods/services….

Read Full Post

6

October 18, 2018

By Hannah Ellis

How to Prevent, Identify and Address Vicarious Trauma — While Conducting Open Source Investigations in the Middle East

Whether it involves victims of a chemical attack or a bombing, open source investigators are required to watch and interact with raw footage from the field — it lies at the core of online open source investigation. As a consequence of the increase in eyewitness media, investigators come in contact with a high amount of…

Read Full Post

13

October 15, 2018

By Dan Kaszeta

Use of Ricin: Is This Amateur Hour?

Recent incidents have brought up the subject of the biological toxin known as ricin as a possible terrorist weapon. A Utah man, one William Clyde Allen III, was arrested by the FBI for having sent letters laced with ricin to the U.S. Secretary of Defense and the Chief of Naval Operations. In June of 2018,…

Read Full Post

21

September 5, 2018

By Nathan Ruser

How to Scrape Interactive Geospatial Data

With few exceptions, everything that appears in your browser can be downloaded and transformed into useable data formats, with many organisations or individuals maintain complex and publicly accessible datasets containing valuable information. Despite being publicly viewable, in many cases the underlying data is not able to be downloaded and further analysed. This guide will focus…

Read Full Post

9

September 4, 2018

By Benjamin Strick

How to Identify Burnt Villages by Satellite Imagery  — Case-Studies from California, Nigeria and Myanmar

Evidence of human rights abuses often remains in some of the world’s most regional and unreachable parts. It is in these areas, where a view from satellite imagery above can be the sole method of visual evidence of bombings, attacks, and the destruction of communities. As satellite imagery becomes more available and technology permits for…

Read Full Post

4