Fundamentals of open-source intelligence for journalists




pen-source intelligence (OSINT) – the gathering and analysis of publicly available information found on social media, and in databases and government records – can be invaluable in situations when information is sparse, controlled or censored. Journalists today leverage OSINT to expose corruption, investigate war crimes and crimes against humanity, and hold governments and other powerful actors to account.

The investigative journalism group Bellingcat has pioneered the use of OSINT in its cutting-edge reporting over the years. The outlet’s journalists have used OSINT to uncover Russia’s involvement in the 2014 downing of Malaysian Flight MH17 over Ukraine, provide critical evidence of the Syrian government's use of chemical weapons against civilians, and revealed the massacre of civilians by Cameroonian soldiers in 2020, among other investigations.

 
"We've uncovered and verified lots of potential war crimes, [...] spy networks, state-backed assassination teams, the movements and activities of drug cartel leaders, [...] and sanctions breaches by the likes of Russia, Iran and many, many more,” said Bellingcat’s lead editor, Eoghan Macguire, during a recent IJNet Crisis Reporting Forum session. 

Macguire outlined how Bellingcat has used OSINT to support its investigations across Africa, and he provided key tools and resources for journalists interested in using OSINT in their own investigative reporting.

Using OSINT to identify war crimes
In his presentation, Macguire detailed how his team investigated alleged war crimes in Ethiopia's Tigray region during the Tigray war, which lasted from November 2020 until November 2022. During what was a civil war, the Ethiopian government and its allies fought against the Tigray People’s Liberation Front. 

Bellingcat reporters began their investigation in March 2021 when graphic videos purportedly depicting the execution of civilians by Ethiopian soldiers surfaced on social media. "Even though these were tough videos to watch, they contained clues that allowed us to verify crucial details,” said Macguire.

Bellingcat investigators analyzed the shadows cast in the footage to deduce the time of day the videos were filmed, and the team used PeakVisor, an app originally designed for mountaineers, to determine the location where the videos were filmed. 

An alternative to Google Maps, which offers only limited detail in rural areas, explained Macguire, PeakVisor provided valuable topographic information that Bellingcat’s journalists could identify in the videos, such as ridges and plateaus. They then compared these features against satellite imagery from Google Earth to identify the location of the massacre: a village known as Mahbere Dego in the Tigray region.  

To identify the perpetrators of the massacre, Bellingcat examined the language spoken in the videos and the uniforms being worn. "Using independent translators, we established that the soldiers were speaking Amharic, indicating they were not from the Tigray region,” Macguire said. This led to the conclusion that they were likely members of the Ethiopian military. 

Ultimately, in collaboration with Newsy and BBC Africa Eye, Bellingcat reported that the executions were carried out by Ethiopian forces. "It was important information to put out," MacGuire stressed, noting that other major news organizations including CNN later corroborated their results using similar methods.

Tools of the trade
Crucially, many of the tools employed in the investigation, including Google Earth, Natural Earth, and PeakVisor, were free. "You don’t have to be a tech wizard or spend lots of money to conduct open-source investigations,” Macguire noted. "With simple online tools, we were able to do something really powerful.”

In another example, Bellingcat utilized open-source software to track and document the movement of ships to shed light on illicit grain trade originating from the Russian-occupied territories of Ukraine. The investigation highlighted how one ship, the Zafar, engaged in ship-to-ship transfers of grain at sea, obscuring the origins of the sanctioned grain, and later integrated the grain into the global market.

Using satellite imagery collected by Planet Labs and ship tracking data from Lloyd's List Intelligence, Bellingcat reconstructed the journey of the Zafar from Crimea, where it was observed loading grain into silos with its Automatic Identification System (AIS) — a system that is required to be turned on to identify a vessel — turned off. The ship later activated its AIS en route to Yemen, where it transitioned through a U.N. inspection point in Djibouti without being flagged as evading sanctions. 

"Satellite imagery provided a different story from what conventional ship tracking revealed,” said Macguire. The investigation raised critical questions about the efficacy of sanctions and U.N. inspections, and ignited concerns about lack of oversight by U.N. officials of sanction-evading vessels.

The future of OSINT
The potential of open-source data extends beyond journalism; it has implications in legal settings, too, including being used as evidence in international courts. 

As the field matures, however, it faces unique challenges — developments in social media, AI, and disinformation, to name a few. "Social media platforms, once goldmines for information, have become more difficult to navigate,” Macguire observed. He highlighted, in particular, recent changes to platforms like X, which once offered a wealth of information as users regularly posted on the platform, but has seen its use decline after being acquired by Elon Musk.

Emerging technologies like AI, meanwhile, present both opportunities and threats. Although tools developed to analyze large amounts of data — for example, satellite image datasets — can enhance investigative capabilities, AI’s ability to generate deceptive content also poses challenges. "As AI improves, distinguishing between authentic and fabricated images may become increasingly complex,” Macguire warned.

Bellingcat encourages journalists and researchers to collaborate when utilizing OSINT data, sharing their findings and methodologies. As the outlet continues to refine its techniques and adapt to a shifting media landscape, it remains committed to transparency. "The results you can get [from OSINT] can be really, really important,” Macguire said.  

OSINT resources
Macguire offered several tools and resources for journalists interested in OSINT. Here are a few: 

Open-source community
Bellingcat’s Discord allows members to engage, learn and collaborate with fellow OSINT investigators. Beginners and experts alike are welcome.

General OSINT toolkits
Bellingcat’s Online Open Source Investigation Toolkit

BBC Africa Eye Forensics Dashboard

Free satellite imagery
Sentinel Hub EO Browser

Google Earth

Paid satellite imagery (generally of higher quality)
Planet Labs

Maxar Technologies

Free ship tracking data
Global Fishing Watch

Paid ship tracking data
Lloyd's List Intelligence

Marine Traffic

VesselFinder

Aircraft tracking
ADS-B Exchange

Flight Radar 24

Free open-source tools
Bellingcat GitHub



source/ International Journalists' Network



AM:10:33:18/11/2024




viewer 96