Read the latest in our efforts to help provide new details around child exploitation cases.

New from @Mabl2K bellingcat.com/news/2021/04/3…
@Mabl2K In 2015, the #FBI released images of John Doe 29. This individual is NOT accused of committing any abuse but may have critical information pertaining to the identity of a child victim in an ongoing sexual exploitation investigation
@Mabl2K In 2020, FBI’s Endangered Child Alert Program (ECAP) added more images to the John Doe 29 case. But where in the world were these images taken?
@Mabl2K We were able to identify the location where the victim was seated to a resort town in southern Turkey.

This is how we did it...
@Mabl2K We enhanced the FBI’s image labelled BB002 to reveal a small red object seen through the window in the background. It was an element that seemed to contain a key piece of information: a Turkish flag.
@Mabl2K After checking the top tourist destinations in Turkey, a virtual stop in the town of “Side” revealed matching façade and street elements featured in FBI’s image BB002:
@Mabl2K Determined to find the pool, we roughly recreated the scene observed in the FBI’s other image (labelled BB001) by constructing a 3D model using @SketchUp. This helped us understand the layout and aim for the right spot in our hunt
@Mabl2K @SketchUp We soon discovered a hotel facility on an online booking site. Although not a matching pool, this hotel used the same type of stainless steel litter bins seen in the FBI’s image BB001. The hotel belongs to a group which would lead us to the final location.
@Mabl2K @SketchUp Close to the town of Side in Turkey we found a hotel where all the main elements seen in the FBI’s image BB001 were a match. We used publicly available pictures taken by guests to verify the location.
@Mabl2K @SketchUp In the FBI’s image BB001, we can see the victim was seated inside a cocktail bar by the pool. The colour, style, shape and position of the parasols as well as the trees and sun loungers are a match.
@Mabl2K @SketchUp By tracking and analysing some of the physical elements around the pool, we determined the FBI’s image BB001 was taken in summer 2006.
@Mabl2K @SketchUp Read the full article with further details on how this geolocation was made here bellingcat.com/news/2021/04/3…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Bellingcat

Bellingcat Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bellingcat

30 Apr
We've put all information about our Digital Showcase Series on one page! You can register for upcoming free events (one on Ukrainian corruption, and one on investigating the Darknet and Telegram) there, and watch recordings of our previous showcases.
bellingcat.com/resources/2021…
Our next digital showcase will be on May 7, 3pm Kyiv time, featuring Anna Kalyuzhna from @bihusinfo, in Ukrainian. She will detail digital investigative methods in uncovering financial corruption. Check the page below to bookmark the Zoom webinar link.
bellingcat.com/resources/2021…
On Saturday (May 8) at 4pm Moscow/2pm London, @Soshnikoff will show how to use the darkweb and Telegram for journalistic investigations. The session will be led in Russian.
Find the Zoom webinar link below, and bookmark it for next weekend:
bellingcat.com/resources/2021…
Read 5 tweets
26 Apr
The latest from Respekt, @the_ins_ru and Bellingcat, revealing more details into the GRU's operations in Europe, evidencing how there were linked to the conflict in Ukraine bellingcat.com/news/uk-and-eu…
We previously identified more team members of the GRU team responsible for the Vrbetice warehouse explosion in Czechia, and that it included the most senior leadership of the unit.
bellingcat.com/news/2021/04/2…
Two open questions remain the subject of speculation by the press: First, whether the sabotage operation in Czechia in 2014 is linked to the poisoning of the arms manufacturer Emilian Gebrev in 2015 bellingcat.com/news/uk-and-eu…
Read 12 tweets
23 Apr
India’s coronavirus crisis continues to escalate as it becomes one of the most severely hit countries in the world to date.

In desperation, many are turning to social media sites such as Twitter to find medical resources bellingcat.com/news/2021/04/2…
These cries for help are poignant and heartbreaking.

But they also provide a window of observation into the speed of escalation of the crisis and the dangers Covid-19 still poses.

Hashtags such as #IndiaNeedsOxygen & #COVIDEmergency2021 have become commonplace
During March, there were on average only five tweets per day (excluding retweets) containing the keywords “delhi” and “urgent”.

By April 21, this had increased to over 400, with a new request for help sent every 24 seconds late in the evening on April 22.
Read 8 tweets
22 Apr
A (re)discovered series of posts seemingly authored by Q shed a little more light on the figure behind the notorious conspiracy. Largely unnoticed, they have not entered "official" aggregators of "Q drops" - as true believers call Q's prophecies.

bellingcat.com/news/rest-of-w…
How do we know they share the same author as Q's "canonical" posts? These "lost drops" include large sections of text which are identical to both previous and subsequent Q drops, in several cases sharing a unique user ID with the latter.
Compare Lost drop A (left) with canonical drop 4 (right). These apocryphal "Q drops" were made shortly after the first verified Q drop, on October 28, 2017. The conspiracy was in its infancy - what would an impostor have to gain?
Read 7 tweets
20 Apr
Thanks to everyone who attended today's digital showcase from @zkharazian, who discussed how to track disinformation in an Armenian context.

You can watch a recording of the event here (~2.5 hours):
You can watch this Monday's digital showcase event, ran by @RuslanLeviev, here (Russian):
Our next digital showcase event will be @Soshnikoff on May 6th, with a presentation led in Russian on an investigation he conducted, and then on May 7, a presentation in Ukrainian from a journalist at @bihusinfo focusing on anti-corruption investigations using OSINT techniques.
Read 4 tweets
20 Apr
New details of the Czech arms depot explosion in 2014 from Bellingcat, including details of a senior GRU leader's direct involvement, and details of other team members involved bellingcat.com/uncategorized/…
Bellingcat has established that the GRU operation which Czech authorities have linked to the explosion of the munition depot in Vrbetice on 16 October 2014, involved at least six operatives from GRU’s Unit 29155. Image
It was supervised personally by its commander, Col. Gen. Andrey Averyanov, a senior deputy to the head of the GRU, who traveled undercover to Central Europe at the exact time of the operation and left back to Moscow mere hours after the explosion. Image
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!