US soldiers stationed on European bases that host nuclear weapons have exposed a multitude of sensitive security details -- including where weapons are stored & secret duress words -- by using flashcard learning apps that appear publicly in online searches bellingcat.com/news/2021/05/2…
While the presence of US nuclear weapons in Europe has long been detailed by various leaked documents, photos and statements by retired officials, their specific locations are officially still a secret with governments neither confirming nor denying their presence.
As many campaigners see it, this ambiguity has often hampered open and democratic debate about the rights and wrongs of hosting nuclear weapons in some European nations.
Bellingcat's @FoekePostma was able to find flashcards posted by soldiers at all 6 bases in Europe that are reported to store nuclear weapons. The position of cameras, which vaults contain weapons and the type of equipment used response forces were just some of the details exposed
@FoekePostma This information was discovered by simply searching Google for key terms relating to nuclear weapons and relevant bases in Europe. Some flashcards appear to have been online and publicly visible for as long as eight years.
@FoekePostma Experts approached by Bellingcat said that these findings represented serious breaches of security protocols and raised renewed questions about US nuclear weapons deployment in Europe.
@FoekePostma Disarmament activists said that continued secrecy about the weapons risked the security of populations in Europe.
@FoekePostma Some US soldiers even posted images from on base. This picture was uploaded to Facebook in 2013 and appears to show US service members at Volkel Air Base in the Netherlands.
@FoekePostma When approached for comment the Dutch MoD said the device pictured was inert, although they added that the picture “should not have been taken, let alone published.”
@FoekePostma A spokesperson for the US Air Force said they were aware flashcard apps were used by soldiers and were investigating the suitability of information published on these platforms.
@FoekePostma They added that they would not discuss past or current security protocols.
@FoekePostma Bellingcat sent a non-exhaustive list of 50 flashcards it had found when approaching the US Military for comment in the weeks before publishing this article. All examples appeared to have been taken down before publication
There have been two major developments regarding our joint investigation examining pushback of refugees on the borders of the European Union by @Frontex, which we undertook with our partners @LHreports, @derspiegel, @ARD_Presse and @tv_asahi_news
The first is that legal action is being taken by @LexFront, @ProgressLawyers and Greek Helisnki Monitor against Frontex in the @EUCourtPress, due to allegations of Human Rights violations in the Aegean Sea.
The second is that reporting by @derspiegel shows Frontex’s own human rights watchdog believes that our reporting on this issue is based on “solid evidence”.
@obtusatum By combining the results of many geocoded queries, Bellingcat was able to make an approximate map of the geographic distribution of tweets looking for urgent assistance across India and its South Asian neighbours, many of which are experiencing their own coronavirus crises
@N_Waters89 Assessing the angle of shadows is already a relatively widely used technique that can help gauge when an a video or image or video was taken. Tools like SunCalc are a huge help when employing this method.
But what about when the angle of a shadow can’t be established?
@N_Waters89 Luckily, if the conditions are right, the length of a shadow can be analysed to provide similar info
Berlin Group 21 recently raised concerns about the OPCW and its investigation into the Douma attack, garnering signatures for a “Statement of Concern”
But it has since faced questions about relations with another group known for conspiracy theories bellingcat.com/news/2021/05/1…
Last month Newlines magazine reported that BG21, which was set up by two former diplomats and an Ivy League academic, was a “front” organisation for another body, the Working Group on Syria, Propaganda and the Media (WGSPM) newlinesmag.com/reportage/how-…
An email sting earlier this year, meanwhile, saw a member of the WGSPM boast of arranging media coverage for BG21 to an individual he mistakenly took to be a Russian intelligence officer.
Bellingcat and @cerosetenta are monitoring the protests in Colombia, collecting and analyzing videos of police brutality against demonstrators.
We're launching a mapping platform to help track police violence during this latest round of protests. cerosetenta.uniandes.edu.co/represion-y-mu…
Previously, we assisted @cerosetenta with the #9S project, which focused on police violence against demonstrators at five locations in and around Bogotá during the 9 September 2020 protests.
Watch those reports here: youtube.com/playlist?list=…
Our collaboration with @cerosetenta follows our first joint investigation in 2019 conducted alongside @Newsy, which identified the badge number of the police officer who killed a student named Dilan Cruz at a protest in Bogotá that year.
Where in the world is Q, the imageboard user whose mysterious “drops” spawned an army of followers? Thanks to image metadata, we may finally have an answer -- albeit a very broad one. bellingcat.com/news/rest-of-w…
Highlighted below are the only two time zones where, in our sample, two or more of Q’s images were taken. The vast majority were from the Pacific time zone.
Most images in Q drops don’t have enough useful metadata to analyse, but a specific subset does. They're screenshots from a phone. In the “DateCreated” field, we found timestamps that reveal the time when Q took these screenshots, just before posting a drop with them attached.