Found 476 bookmarks
Newest
How to Find Historical Imagery of Russia's Faked Satellite Photos - bellingcat
How to Find Historical Imagery of Russia's Faked Satellite Photos - bellingcat
In Bellingcat’s latest report, Forensic Analysis of Satellite Images Released by the Russian Ministry of Defense, we exposed how Russia had falsely claimed satellite imagery from June 2014 was from July 14th and July 17th. As with nearly all of Bellingcat’s work we used open source information, satellite imagery from Google Earth, to expose the fake […]
·bellingcat.com·
How to Find Historical Imagery of Russia's Faked Satellite Photos - bellingcat
Mapping Where Sex Offenders Can Live - bellingcat
Mapping Where Sex Offenders Can Live - bellingcat
This article was originally posted to the AutomatingOSINT.com blog. Recently I was listening to an episode of the Freakonomics podcast titled, “Making Sex Offenders Pay – And Pay and Pay” which you can listen tohere. The premise behind the episode was that sex offenders are a bit unique in how they are punished by the […]
·bellingcat.com·
Mapping Where Sex Offenders Can Live - bellingcat
Unveiling Hidden Connections with Google Analytics IDs - bellingcat
Unveiling Hidden Connections with Google Analytics IDs - bellingcat
Imagine you are researching an anonymous website with no clues as to its authorship. A single string of code could link that site to another, which perhaps reveals the identity of the owner. With the right tools, this information can be surprisingly easy to uncover. Site fingerprinting with embedded code Google Analytics is a popular […]
·bellingcat.com·
Unveiling Hidden Connections with Google Analytics IDs - bellingcat
Using Python to Mine Common Crawl - bellingcat
Using Python to Mine Common Crawl - bellingcat
This article was originally posted on the AutomatingOSINT.com blog. One of my Automating OSINT students Michael Rossi (@RossiMI01) pinged me with an interesting challenge. He had mentioned that the Common Crawl project is an excellent source of OSINT, as you can begin to explore any page snapshots they have stored for a target domain. Michael wanted […]
·bellingcat.com·
Using Python to Mine Common Crawl - bellingcat
Automatically Discover Website Connections Through Tracking Codes - bellingcat
Automatically Discover Website Connections Through Tracking Codes - bellingcat
This article originally appeared on the AutomatingOSINT.com blog. Fellow Bellingcat contributor Lawrence Alexander did some really interesting OSINT work on analyzing the hidden links between websites using tracking and analytics codes. In his how-to titled “Unveiling Hidden Connections With Google Analytics IDs” he shows how you can begin to see how websites are connected to […]
·bellingcat.com·
Automatically Discover Website Connections Through Tracking Codes - bellingcat
Yachtspotting: OSINT Methods in Navalny's Corruption Investigation - bellingcat
Yachtspotting: OSINT Methods in Navalny's Corruption Investigation - bellingcat
Recently, Russian President Vladimir Putin’s press secretary, Dmitry Peskov, found himself embroiled in a scandal over his wristwatch, which was prominently displayed during his wedding to former Olympic ice dancer Tatiana Navka. Anti-corruption activist and Kremlin opponent Aleksey Navalny revealed that a watch worn by Peskov was worth upwards of $600,000, despite Peskov’s approximate annual […]
·bellingcat.com·
Yachtspotting: OSINT Methods in Navalny's Corruption Investigation - bellingcat
Follow the Money with Python - bellingcat
Follow the Money with Python - bellingcat
This article was originally published on the AutomatingOSINT.com blog. Lots of OSINT investigations involve looking at companies, their structure, and of course their directors. Just yesterday, CBC News here in Canada did a story about a wealthy family allegedly using tax havens as a means to avoid paying taxes. As part of the news story […]
·bellingcat.com·
Follow the Money with Python - bellingcat
Gangs of Detroit: OSINT and Indictment Documents - bellingcat
Gangs of Detroit: OSINT and Indictment Documents - bellingcat
This article was originally published on the AutomatingOSINT.com blog. VICE News ran a story about a gang in Detroit, Michigan that was nabbed partly due to their use of social media. This of course caught my attention so I clicked the link to the indictment papers and began to have a read. I find court documents completely […]
·bellingcat.com·
Gangs of Detroit: OSINT and Indictment Documents - bellingcat
Automatically Reverse Image Search YouTube Videos - bellingcat
Automatically Reverse Image Search YouTube Videos - bellingcat
This post originally appeared on the AutomatingOSINT.com blog. Eliot Higgins had an excellent post where he shows how to grab preview images from YouTube videos and use them for verification, or potentially to find additional sites where that video might be shown or linked to. This technique is called reverse image searching which I have covered […]
·bellingcat.com·
Automatically Reverse Image Search YouTube Videos - bellingcat
Automatically Finding Weapons in Social Media Images Part 1 - bellingcat
Automatically Finding Weapons in Social Media Images Part 1 - bellingcat
This article was originally published on the AutomatingOSINT.com blog. As part of my previous post on gangs in Detroit, one thing had struck me: there are an awful lot of guns being waved around on social media. Shocker, I know. More importantly I began to wonder if there wasn’t a way to automatically identify when […]
·bellingcat.com·
Automatically Finding Weapons in Social Media Images Part 1 - bellingcat
Automatically Finding Weapons in Social Media Images Part 2 - bellingcat
Automatically Finding Weapons in Social Media Images Part 2 - bellingcat
This post was originally published on the AutomatingOSINT.com blog. In the first part of this series we examined how to write some code that can slice and dice and image and then submit it to Imagga. By examining the tags that come back we can make a fairly accurate guess as to whether there is […]
·bellingcat.com·
Automatically Finding Weapons in Social Media Images Part 2 - bellingcat
Automated Reverse Image Search Part 2: Vimeo - bellingcat
Automated Reverse Image Search Part 2: Vimeo - bellingcat
This article was originally published on the AutomatingOSINT.com blog. In a previous blog post I covered how to utilize the YouTube API to find the preview images for videos and then reverse search them using the TinEye API. In this blog post we will cover how to use the same techniques for Vimeo to retrieve […]
·bellingcat.com·
Automated Reverse Image Search Part 2: Vimeo - bellingcat
When People Sleep: Determine Facebook Activity Using Google Chrome, Javascript and Python - bellingcat
When People Sleep: Determine Facebook Activity Using Google Chrome, Javascript and Python - bellingcat
This article was originally published on the AutomatingOSINT.com blog. It is always an interesting question and one that was posed over on the IntelTechniques.com forums. How can you tell what hour of the day people are most active on Facebook? There are tools out there for Twitter and other platforms, but due to Facebook’s limited […]
·bellingcat.com·
When People Sleep: Determine Facebook Activity Using Google Chrome, Javascript and Python - bellingcat
Expanding Skype Forensics with OSINT and Python: IP Addresses - bellingcat
Expanding Skype Forensics with OSINT and Python: IP Addresses - bellingcat
This article was originally published on AutomatingOSINT.com. In the first part of this series we covered how to extract email accounts from SQLite databases and pull additional information from FullContact.com to find social media accounts or other online profiles that are associated with those email addresses. In this post we will apply much the same technique except […]
·bellingcat.com·
Expanding Skype Forensics with OSINT and Python: IP Addresses - bellingcat
Expanding Skype Forensics with OSINT: Email Accounts - bellingcat
Expanding Skype Forensics with OSINT: Email Accounts - bellingcat
This article was originally published on the AutomatingOSINT.com blog. I will be the first to tell you that I know little about forensics compared to most law enforcement or private forensic examiners. One thing that I always found amazing was looking at the result of a forensic acquisition and seeing all of that magical data flowing […]
·bellingcat.com·
Expanding Skype Forensics with OSINT: Email Accounts - bellingcat
Dark Web OSINT With Python and OnionScan: Part One - bellingcat
Dark Web OSINT With Python and OnionScan: Part One - bellingcat
You may have heard of this awesome tool called OnionScan that is used to scan hidden services in the dark web looking for potential data leaks. Recently the project released some cool visualizations and a high level description of what their scanning results looked like. What they didn’t provide is how to actually go about […]
·bellingcat.com·
Dark Web OSINT With Python and OnionScan: Part One - bellingcat
Dark Web OSINT with Python Part Two: SSH Keys and Shodan - bellingcat
Dark Web OSINT with Python Part Two: SSH Keys and Shodan - bellingcat
This entry was originally posted on the AutomatingOSINT.com blog. Welcome back good Python soldiers. In Part One of this series we created a wrapper around OnionScan, a fantastic tool created by Sarah Jamie Lewis (@sarajamielewis). If you haven’t read Part One then go do so now. Now that you have a bunch of data (or you […]
·bellingcat.com·
Dark Web OSINT with Python Part Two: SSH Keys and Shodan - bellingcat
Dark Web OSINT With Python Part Three: Visualization - bellingcat
Dark Web OSINT With Python Part Three: Visualization - bellingcat
This article was originally published on the AutomatingOSINT.com blog. Welcome back! In this series of blog posts we are wrapping the awesome OnionScan tool and then analyzing the data that falls out of it. If you haven’t read parts one and two in this series then you should go do that first. In this post we […]
·bellingcat.com·
Dark Web OSINT With Python Part Three: Visualization - bellingcat
How to Uncover Corruption Using Open Source Research - bellingcat
How to Uncover Corruption Using Open Source Research - bellingcat
When most people think about open source research, they think about uncovering social media materials of soldiers on the front-lines of the wars in Ukraine and Syria, or geolocating video footage of significant events with Google Earth. While open source materials have led a mini-revolution in how conflicts are reported online, there is another area where there […]
·bellingcat.com·
How to Uncover Corruption Using Open Source Research - bellingcat
Dark Web OSINT Part Four: Using Scikit-Learn to Find Hidden Service Clones - bellingcat
Dark Web OSINT Part Four: Using Scikit-Learn to Find Hidden Service Clones - bellingcat
This article was originally posted on the AutomatingOSINT.com blog. Welcome back to the fourth and final instalment in this series. If you haven’t read part one, two or three definitely feel free to go and do so. This will be much shorter than the others The original inspiration for this post was from a @krypti3a blog […]
·bellingcat.com·
Dark Web OSINT Part Four: Using Scikit-Learn to Find Hidden Service Clones - bellingcat
Vacuuming Image Metadata from the Wayback Machine - bellingcat
Vacuuming Image Metadata from the Wayback Machine - bellingcat
This article was originally posted at the AutomatingOSINT.com blog. Not long ago I was intrigued by the Oct282011.com Internet mystery (if you haven’t heard of it check out this podcast). Friends of the Hunchly mailing list and myself embarked on a brief journey to see if we could root out any additional clues or, of […]
·bellingcat.com·
Vacuuming Image Metadata from the Wayback Machine - bellingcat
Forecasting An Internet Shutdown: An Exercise With Indicators - bellingcat
Forecasting An Internet Shutdown: An Exercise With Indicators - bellingcat
Internet shutdowns happen - more frequently than we often hear. An impressive 56 countrywide shutdowns were documented in 2016, according to Access Now’s campaign #KeepItOn, which also defines a shutdown as “an intentional disruption of internet or electronic communications, rendering them inaccessible or effectively unusable, for a specific population or within a location, often to exert control over the flow of information.”
·bellingcat.com·
Forecasting An Internet Shutdown: An Exercise With Indicators - bellingcat
Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx - bellingcat
Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx - bellingcat
This article was originally posted on the AutomatingOSINT.com blog. Having an early warning system is an incredibly useful tool in the OSINT world. Being able to monitor search engines and other sites for keywords, IP addresses, document names, or email addresses is extremely useful. This can tell you if an adversary, competitor or a friendly […]
·bellingcat.com·
Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx - bellingcat
Companies House: A Short Guide - bellingcat
Companies House: A Short Guide - bellingcat
The research behind the joint report with Transparency International was only made possible due to the government’s decision in 2014 to make its records available to the public free of charge.   Due to the volume of Scottish Limited Partnerships (“SLPs”) incorporated during 2016 this information would have previously cost thousands of pounds. A similar investigation […]
·bellingcat.com·
Companies House: A Short Guide - bellingcat
Advanced Guide on Verifying Video Content - bellingcat
Advanced Guide on Verifying Video Content - bellingcat
One of the most common issues for researchers and journalists is verifying user-generated video content, most often found on social networks and file sharing platforms, such as YouTube, Twitter, Facebook, and so on. There is no silver bullet to verify every video, and it may be nearly impossible to verify some videos short of acquiring […]
·bellingcat.com·
Advanced Guide on Verifying Video Content - bellingcat
HISTINT: Unearthing declassified Soviet military journals in CIA archives - bellingcat
HISTINT: Unearthing declassified Soviet military journals in CIA archives - bellingcat
Quick links: Article cards – Full list – Raw spreadsheet In January of 2017, CIA made the entirety of their declassified records collection available online. Previously, only select documents were available through the online collection, with the rest available only through National Archives at College Park, Maryland. Thus, for researchers of intelligence such as myself, […]
·bellingcat.com·
HISTINT: Unearthing declassified Soviet military journals in CIA archives - bellingcat
Automatically Discover Website Connections Through Tracking Codes - bellingcat
Automatically Discover Website Connections Through Tracking Codes - bellingcat
This post was originally posted on the AutomatingOSINT.com blog here.A few years ago Lawrence Alexander published a great piece on finding connections between websites using Google Analytics (among others) codes. Last year I had published a post where I taught you how to automatically mine some of this information using Python, and then how to visualize it. Unfortunately the […]
·bellingcat.com·
Automatically Discover Website Connections Through Tracking Codes - bellingcat
Follow the Bitcoin With Python, BlockExplorer and Webhose.io - bellingcat
Follow the Bitcoin With Python, BlockExplorer and Webhose.io - bellingcat
This article was originally posted to the AutomatingOSINT.com blog. More and more investigations are being conducted on Tor and many of them can also include investigating Bitcoin transactions. The nature of Bitcoin is such that the transactions themselves are designed to be anonymous but there are many other factors that can dictate whether the owner […]
·bellingcat.com·
Follow the Bitcoin With Python, BlockExplorer and Webhose.io - bellingcat