the home of online investigations

Category: Resources

October 29, 2015

By Justin Seitz

WixFul Thinking: Mining Hidden Wix Pages

Wix is a popular free website hosting platform, that has 73 million users across 180 countries (stats from Wix themselves). Recently while working on an investigation, I was spending time hunting around a website that is hosted on Wix and I discovered an interesting anomaly.

Read Full Post

5

October 5, 2015

By Bellingcat Investigation Team

Crowdsourced Geolocation and Analysis of Russian MoD Airstrike Videos from Syria

Since the beginning of Russia’s air campaign in Syria the Russian Ministry of Defence has been posting videos of some of its airstrikes on its YouTube channel, and initial geolocation analysis of those videos have shown there’s a number of issues with the details provided by the Russian Ministry of Defence along with those videos….

Read Full Post

89

September 22, 2015

By Eliot Higgins

Geolocating Russian Military Aircraft in Syria

Over the last week there’s been a great deal of interest in the movement of Russian military equipment and troops to Syria, with images published by AllSource Analysis of al-Assad International Airport showing the arrival of military aircraft supporting Russia’s growing presence. Today a photograph was shared on Twitter showing what claimed to be the aircraft visible in…

Read Full Post

10

September 11, 2015

By Justin Seitz

Follow the Money with Python

This article was originally published on the AutomatingOSINT.com blog. Lots of OSINT investigations involve looking at companies, their structure, and of course their directors. Just yesterday, CBC News here in Canada did a story about a wealthy family allegedly using tax havens as a means to avoid paying taxes. As part of the news story…

Read Full Post

0

August 28, 2015

By Justin Seitz

Automatically Discover Website Connections Through Tracking Codes

This article originally appeared on the AutomatingOSINT.com blog. Fellow Bellingcat contributor Lawrence Alexander did some really interesting OSINT work on analyzing the hidden links between websites using tracking and analytics codes. In his how-to titled “Unveiling Hidden Connections With Google Analytics IDs” he shows how you can begin to see how websites are connected to…

Read Full Post

1

August 19, 2015

By Aric Toler

Yachtspotting: OSINT Methods in Navalny’s Corruption Investigation

Recently, Russian President Vladimir Putin’s press secretary, Dmitry Peskov, found himself embroiled in a scandal over his wristwatch, which was prominently displayed during his wedding to former Olympic ice dancer Tatiana Navka. Anti-corruption activist and Kremlin opponent Aleksey Navalny revealed that a watch worn by Peskov was worth upwards of $600,000, despite Peskov’s approximate annual…

Read Full Post

7

August 13, 2015

By Justin Seitz

Using Python to Mine Common Crawl

This article was originally posted on the AutomatingOSINT.com blog. One of my Automating OSINT students Michael Rossi (@RossiMI01) pinged me with an interesting challenge. He had mentioned that the Common Crawl project is an excellent source of OSINT, as you can begin to explore any page snapshots they have stored for a target domain. Michael wanted…

Read Full Post

6

August 7, 2015

By Aric Toler

Shadow of a Doubt: Crowdsourcing Time Verification of the MH17 Missile Launch Photo

While much open source investigation is done through crowd sourcing, the administrator of the MH17 webtalk.ru forum has taken a unique approach: a single-blind poll to collaboratively determine the timing of a photograph. While this experiment does not have the scientific rigor of a pharmaceutical trial, the methodology of administrator “bootblack” is worthwhile of some examination. The…

Read Full Post

77