Last week I spoke at @journalismfest on how open-source intelligence is used to combat propaganda and uncover new information during Russia's war on Ukraine. Thank you for having me.
I promised to share a list of links to tools and sources. Here it is (I hope it helps) 👇
I often share digital investigation skills, cases and sources at events to help remotely answer core questions such as:
WHERE & WHEN did it happen?
WHAT happened?
WHO is responsible?
And HOW can it be visualised?
So let's start with the case studies.
1: EyesonRussia.org - our community effort to document, verify and map Russia's invasion of Ukraine and share this info with the world.
What are some data and tools that are helpful to use?
Here's a non-exhaustive list of a few OSINT tools, sources of data and specialists 👇
1. @ACLEDINFO - disaggregated data collection, analysis, and crisis mapping project. acleddata.com
Great for mapping media reports of specific instances, trends, statistics and a general geographical awareness. Especially useful when combined with other datasets.
2. The @bellingcat autoarchiver - automatically archives social media posts, videos, and images from a Google Sheets document. github.com/bellingcat/aut…
This has enabled us to easily archive thousands of grim videos and photos that could be used by researchers in the future.
3. Telegram export channel history - automatically export an entire channel in Telegram, choose date, file types. Available in the Telegram desktop.
Very helpful if you don't want to flick through traumatic imagery. You can also convert the chat file into a spreadsheet.
4. @oryxspioenkop tracker of military vehicles during Russia's invasion of Ukraine.
7. Overpass Turbo - web based data mining tool for OpenStreetMap. overpass-turbo.eu
(Image below is a map of power plants/stations made with Overpass Turbo)
8. Map of Russian fortifications - the map shows Russia’s field fortifications in (and around) Ukraine as viewed via satellite imagery. (by @bradyafr) google.com/maps/d/u/0/vie…
9. NASA FIRMS - near real-time active fire data. This tool has been core to work across Ukraine, Myanmar, Sudan, Ethiopia and many others. firms.modaps.eosdis.nasa.gov/map
I have received a number of messages asking about the location of this IL-76 (RA-76502) from Russian Aviacon Zitotrans (usually responsible for arms cargo).
It is not landing in Sudan (alleged in the comments), but is landing in Faya-Largeau in northern Chad. More in thread 👇
I identified an original and more clear version on TikTok (not hard if you want to find it). In it, we can see the registration number of the plane much more clearly, as well as the dune and cliffs in the background.
The registration, RA-76502 that had been owned by JSC Aviacon Zitotrans, named by US as "a Russian cargo airline that has handled cargo shipments for sanctioned Russian Federation defense entities".
This festive season I’m sharing a video every day for the next 24 days showing useful OSINT tools & techniques. Creating this OSINT Advent Series has been a lot of fun and I hope it’s helpful for the ever-growing OSINT community! 🎄👇
1. Searching Facebook with WhoPostedWhat.
2. Using AI to identify a car model in an image with Carnet.
Today is #WorldMentalHealthDay. As digital investigators we're often not experiencing what we see online, in real life, but it can still affect many.
So to keep doing the important documentation and investigative work online, here's a few practical steps you can take.👇
1. When sharing graphic content with colleagues and friends, remove those previews and give a little graphic warning indicator. There's always a little 'X' in the corner to remove preview.
2. Consider changing the settings on your social media platforms so you're not absorbing horrific content while doomscrolling. You don't have to filter it out, but at least stop the autoplay.
I was recently on a flight across Australia when I spotted this massive figure on the ground. It led me on a digital journey to find out what it was, how it got there and who made it.
I'm going to explain a bit more about what it is in this thread, and how I found out. 👇🧵
Without internet on the plane, I made a screenshot on my phone of the location (yes it was on flight mode) and later used flight tracking to pinpoint exactly where I saw it.
Using @flightradar24, I traced the path my plane took and found the spot!
Next stop: @googleearth 🗺️
I zoomed into the area and there it was — this huge humanoid figure etched in the Australian outback. Measuring 2.7km tall and covering an area of more than 1.7 square kilometres, it's a sight to behold.
Despite our reporting last week on the fake network of pro-Trump MAGA accounts, there appears to be many more accounts actively posting the exact same content. This one, @brenda_otto_ with 18k+ followers, is stealing photos from an Australian Instagram model in Queensland.
Here's another fake MAGA account, @Tracy_Miller044, stealing images from a fashion blogger (a popular one too).
@Tracy_Miller044 - if you want to reach out and talk about your work, why you're running these campaigns etc, I'm open.
Here is @Sarah_Hickey__
Sarah is stealing the photos of a Czech Instagram influencer to create a persona claiming to be a MAGA republican conservative with 40k+ followers and a blue tick (which means it's apparently not misleading).
A network of fake accounts are posing as young American women, posting pro-Trump content and disinformation, but they’re hiding behind, and manipulating, the images of European fashion influencers.
Our latest investigation at @Cen4infoRes. Details in this thread 🧵👇
Our full analysis can be seen at @Cen4infoRes here: . We also collaborated with @CNN to dig out the human stories behind those who had their photos stolen
One of the accounts is Eva. She lives in the US, and likes hanging out at the beach and posting to her 5000+ followers on X. Eva posts strong opinions against LGBTQ people and the US Democratic party and is a loyal supporter of former US president Donald Trump.