the home of online investigations

Search Results for: MH17

August 13, 2015

By Justin Seitz

Using Python to Mine Common Crawl

This article was originally posted on the AutomatingOSINT.com blog. One of my Automating OSINT students Michael Rossi (@RossiMI01) pinged me with an interesting challenge. He had mentioned that the Common Crawl project is an excellent source of OSINT, as you can begin to explore any page snapshots they have stored for a target domain. Michael wanted…

Read Full Post

6

July 13, 2015

By Bellingcat Investigation Team

Zaroshchens’ke Launch Site: Claims and Reality – A Bellingcat Investigation

This report (which can be found in its entirety here) analyzes in detail one aspect of the downing of Malaysia Airlines Flight 17 (MH17) by a Buk missile system in eastern Ukraine: the plausibility that Zaroshchens’ke was the launch site. First, the Russian Ministry of Defense (MoD) claimed in a press briefing on 21 July…

Read Full Post

115

June 5, 2015

By Aric Toler

Who to Trust, Google or the Russian MoD? A Guide to Verifying Google Earth Satellite Image Dates

Этот пост также доступен на русском языке в переводе @Mortis_Banned Bellingcat recently published an in-depth investigation finding that the Russian Ministry of Defense (MoD) fabricated and misrepresented their satellite photographs in a July 21, 2014 press conference, immediately following the July 17 downing of MH17. The most obvious and compelling evidence of this investigation was…

Read Full Post

230

June 4, 2015

By Nathan Patin

Does Ukraine Have 9M38M1 Missiles?

Earlier this week, Russian arms manufacturer Almaz-Antey presented its analysis of the downing of MH17 in an attempt to prove its “non-involvement in the MH17 tragedy.” The company concluded that while MH17 was downed by a 9M38M1 missile fired by a Buk M1, that particular type of missile has not been used by Russian forces since 1999. Bellingcat has since shown that, despite…

Read Full Post

152

May 31, 2015

By Eliot Higgins

How to Find Historical Imagery of Russia’s Faked Satellite Photos

In Bellingcat’s latest report, Forensic Analysis of Satellite Images Released by the Russian Ministry of Defense, we exposed how Russia had falsely claimed satellite imagery from June 2014 was from July 14th and July 17th. As with nearly all of Bellingcat’s work we used open source information, satellite imagery from Google Earth, to expose the fake…

Read Full Post

143

February 17, 2015

By Bellingcat Investigation Team

Bellingcat Report – Origin of Artillery Attacks on Ukrainian Military Positions in Eastern Ukraine Between 14 July 2014 and 8 August 2014

Ukrainian armed forces positioned near the Russian-Ukrainian border were attacked by artillery fire in the summer of 2014. Between 9 July and 5 September 2014, the Ukrainian Border Service and the National Security and Defense Council reported more than 120 artillery attacks from Russia. Russian officials, however, have denied the existence of any artillery attacks on Ukraine originating from its territory. The pressure of sustained artillery attacks through early August led Ukrainian armed forces to lose control of hundreds of kilometers of border territory. Google Earth satellite images of eastern Ukraine from July, August, and September 2014 have enabled the Bellingcat investigation team to find evidence of these artillery attacks, determine their origin, and compare them with local sources. After reviewing and analyzing these satellite images as well as videos from social media, local media reports, and the shifting maps of the ongoing conflict, the Bellingcat investigation team has determined that there is compelling evidence that artillery attacks on Ukrainian territory and against Ukrainian armed forces originated from the territory of Russia.

Read Full Post

96