





























See Also
See Again
© Getty Images
0 / 30 Fotos
What are open source investigations?
- Technology, forensic investigation, and journalism merge together with a variety of disciplines and skill sets to conduct incredible journalistic investigations on a variety of subjects using public data.
© Getty Images
1 / 30 Fotos
Misinformation and fake news
- In an age of mass misinformation and distribution of fake news, citizens have taken a significant role in documenting crimes and abuses. Pictured are posters displayed at the Bremen's central station with the text: "Donkey, dog, cat, shark. - Disinformation changes history! - Even your election on 23.2?"
© Getty Images
2 / 30 Fotos
Social media networks
- Social media networks, blogs, and other publicly accessible sharing platforms all play a significant role in gathering and analyzing information.
© Getty Images
3 / 30 Fotos
Fake data
- Given the prevalence of AI-generated images and other fake data, investigators must verify the accuracy and legitimacy of the information.
© Getty Images
4 / 30 Fotos
Processing time
- The aspect that takes the most time in terms of these investigations is certainly the processing time. There is a massive amount of raw data available to investigators, which they have to make sense of.
© Getty Images
5 / 30 Fotos
Volume of data
- The volume of user-generated data only continues to grow and expand, therefore, there needs to be a special adherence to guidelines and the correct utilization of tools.
© Getty Images
6 / 30 Fotos
Privacy and credibility
- In addition to the volume of data, issues of privacy and credibility of information are also key aspects that offer challenges to investigators.
© Getty Images
7 / 30 Fotos
Aggregation and analysis
- Information is then aggregated and analyzed accordingly. This is done in compliance with privacy, legality, and human rights, among other guidelines.
© Getty Images
8 / 30 Fotos
Widely used
- This investigative method is not just limited to journalism. It is also widely used by law enforcement, cybersecurity technicians, and corporate security entities.
© Getty Images
9 / 30 Fotos
Technicians and entities
- Cyber security technicians monitor different threats. Law enforcement profiles different suspects and gathers evidence accordingly, while corporate security entities conduct thorough background checks.
© Getty Images
10 / 30 Fotos
Journalistic perspective
- From a journalistic perspective, open source investigations look for the facts of the situation, seeking to uncover stories that may be very different than they appear.
© Getty Images
11 / 30 Fotos
Information sources
- In addition to social media content, other information sources also include geospatial data, academic publications, media, public records, and other online resources.
© Getty Images
12 / 30 Fotos
Training
- There are a number of organizations providing training that anyone can do to learn the ins and outs of open source investigations. They are not just limited to those in journalism or any of the other relevant professional fields.
© Getty Images
13 / 30 Fotos
Invaluable skill
- The need for open source investigations spans many different sectors, making it an invaluable skill in today’s investigative work.
© Getty Images
14 / 30 Fotos
Investigation of crimes
- Crimes in Ukraine, Palestine, and the Democratic Republic of Congo (pictured), among many other locations throughout the world, have been investigated, with open source data presented in courts and used in different contexts.
© Getty Images
15 / 30 Fotos
Ukrainian children's hospital
- For example, in July 2024, a Ukrainian children’s hospital was subjected to a missile attack that killed two and injured 50. Russia denied responsibility for the attack and was involved in a campaign in the immediate aftermath which placed blame on a Ukrainian anti-aircraft missile system.
© Getty Images
16 / 30 Fotos
Russian Kh-101 cruise missile
- Using footage collected from social media, as well as a 3D model of the missile, Bellingcat conducted an analysis that determined that the source of the munition was a Russian Kh-101 cruise missile.
© Getty Images
17 / 30 Fotos
Colombian mercenaries
- Bellingcat also conducted another investigation on Colombian mercenaries in Sudan following the disappearance of Colombian national Christian Lombana Moncayo. Pictured is a Colombian mercenary in Ukraine.
© Getty Images
18 / 30 Fotos
Geolocated journey
- The Sudanese Armed Forces (SAF) circulated images of Moncayo’s documents after an ambush. Bellingcat geolocated his journey through Libya through Moncayo’s last social media post—a common site where mercenaries arrive to get to Sudan.
© Getty Images
19 / 30 Fotos
Mapping transit
- Bellingcat put together testimonies and other findings to map out the transit of Colombians through Libya into Sudan and used satellite imagery to locate the exact ambush site.
© Getty Images
20 / 30 Fotos
Forensic Architecture
- In collaboration with the Palestine Land Society, using 3D modeling, geolocation, and other analytical tools, Forensic Architecture was able to map out one of the military campaigns enacted by the Israeli military in the formation of the Israeli state.
© Getty Images
21 / 30 Fotos
Nakba
- The military campaign targeted several Palestinian villages at the time, destroying homes and infrastructure and forcibly displacing its populations—an event known as the ‘Nakba’ (meaning catastrophe in Arabic).
© Getty Images
22 / 30 Fotos
al-Dawayima
- Focusing on the village of al-Dawayima, the organization was able to outline critical historical context as an example of the other military campaigns that were conducted in conjunction.
© Getty Images
23 / 30 Fotos
Marathon Petroleum Corporation
- Forensic Architecture also investigated one of the largest refineries in the western hemisphere: Marathon Petroleum Corporation’s facility, located in Garyville, Louisiana.
© Getty Images
24 / 30 Fotos
Cancer risk
- The communities surrounding the area are subjected to a cancer risk seven times higher than the national average due to the toxic air surrounding the facility.
© Getty Images
25 / 30 Fotos
Chemical spill
- In August 2023, a hydrocarbon chemical mixture began leaking, amounting to the second-largest chemical spill in the last 30 years, according to the US Environmental Protection Agency.
© Shutterstock
26 / 30 Fotos
Increased hospitalizations
- The facility claimed that surrounding communities would not be affected, despite increased hospitalizations in the spill’s aftermath.
© Shutterstock
27 / 30 Fotos
Digital reconstruction
- Using satellite imagery, data mining, 3D modeling, and fieldwork, among other tools, Forensic Architecture was able to produce a digital reconstruction of the spill to demonstrate concentrations of pollutants in the atmosphere and how they, therefore, harmed communities in the region.
© Shutterstock
28 / 30 Fotos
Harm and accountability
- These phenomenal initiatives not only manage to provide a detailed overview of how events likely occurred but also attribute harm and accountability to the parties involved. Sources: (Al-Jazeera) (Bellingcat) (United Nations) (Open Source Investigations) (Neotas) See also: Must-see movies themed around journalism
© Shutterstock
29 / 30 Fotos
© Getty Images
0 / 30 Fotos
What are open source investigations?
- Technology, forensic investigation, and journalism merge together with a variety of disciplines and skill sets to conduct incredible journalistic investigations on a variety of subjects using public data.
© Getty Images
1 / 30 Fotos
Misinformation and fake news
- In an age of mass misinformation and distribution of fake news, citizens have taken a significant role in documenting crimes and abuses. Pictured are posters displayed at the Bremen's central station with the text: "Donkey, dog, cat, shark. - Disinformation changes history! - Even your election on 23.2?"
© Getty Images
2 / 30 Fotos
Social media networks
- Social media networks, blogs, and other publicly accessible sharing platforms all play a significant role in gathering and analyzing information.
© Getty Images
3 / 30 Fotos
Fake data
- Given the prevalence of AI-generated images and other fake data, investigators must verify the accuracy and legitimacy of the information.
© Getty Images
4 / 30 Fotos
Processing time
- The aspect that takes the most time in terms of these investigations is certainly the processing time. There is a massive amount of raw data available to investigators, which they have to make sense of.
© Getty Images
5 / 30 Fotos
Volume of data
- The volume of user-generated data only continues to grow and expand, therefore, there needs to be a special adherence to guidelines and the correct utilization of tools.
© Getty Images
6 / 30 Fotos
Privacy and credibility
- In addition to the volume of data, issues of privacy and credibility of information are also key aspects that offer challenges to investigators.
© Getty Images
7 / 30 Fotos
Aggregation and analysis
- Information is then aggregated and analyzed accordingly. This is done in compliance with privacy, legality, and human rights, among other guidelines.
© Getty Images
8 / 30 Fotos
Widely used
- This investigative method is not just limited to journalism. It is also widely used by law enforcement, cybersecurity technicians, and corporate security entities.
© Getty Images
9 / 30 Fotos
Technicians and entities
- Cyber security technicians monitor different threats. Law enforcement profiles different suspects and gathers evidence accordingly, while corporate security entities conduct thorough background checks.
© Getty Images
10 / 30 Fotos
Journalistic perspective
- From a journalistic perspective, open source investigations look for the facts of the situation, seeking to uncover stories that may be very different than they appear.
© Getty Images
11 / 30 Fotos
Information sources
- In addition to social media content, other information sources also include geospatial data, academic publications, media, public records, and other online resources.
© Getty Images
12 / 30 Fotos
Training
- There are a number of organizations providing training that anyone can do to learn the ins and outs of open source investigations. They are not just limited to those in journalism or any of the other relevant professional fields.
© Getty Images
13 / 30 Fotos
Invaluable skill
- The need for open source investigations spans many different sectors, making it an invaluable skill in today’s investigative work.
© Getty Images
14 / 30 Fotos
Investigation of crimes
- Crimes in Ukraine, Palestine, and the Democratic Republic of Congo (pictured), among many other locations throughout the world, have been investigated, with open source data presented in courts and used in different contexts.
© Getty Images
15 / 30 Fotos
Ukrainian children's hospital
- For example, in July 2024, a Ukrainian children’s hospital was subjected to a missile attack that killed two and injured 50. Russia denied responsibility for the attack and was involved in a campaign in the immediate aftermath which placed blame on a Ukrainian anti-aircraft missile system.
© Getty Images
16 / 30 Fotos
Russian Kh-101 cruise missile
- Using footage collected from social media, as well as a 3D model of the missile, Bellingcat conducted an analysis that determined that the source of the munition was a Russian Kh-101 cruise missile.
© Getty Images
17 / 30 Fotos
Colombian mercenaries
- Bellingcat also conducted another investigation on Colombian mercenaries in Sudan following the disappearance of Colombian national Christian Lombana Moncayo. Pictured is a Colombian mercenary in Ukraine.
© Getty Images
18 / 30 Fotos
Geolocated journey
- The Sudanese Armed Forces (SAF) circulated images of Moncayo’s documents after an ambush. Bellingcat geolocated his journey through Libya through Moncayo’s last social media post—a common site where mercenaries arrive to get to Sudan.
© Getty Images
19 / 30 Fotos
Mapping transit
- Bellingcat put together testimonies and other findings to map out the transit of Colombians through Libya into Sudan and used satellite imagery to locate the exact ambush site.
© Getty Images
20 / 30 Fotos
Forensic Architecture
- In collaboration with the Palestine Land Society, using 3D modeling, geolocation, and other analytical tools, Forensic Architecture was able to map out one of the military campaigns enacted by the Israeli military in the formation of the Israeli state.
© Getty Images
21 / 30 Fotos
Nakba
- The military campaign targeted several Palestinian villages at the time, destroying homes and infrastructure and forcibly displacing its populations—an event known as the ‘Nakba’ (meaning catastrophe in Arabic).
© Getty Images
22 / 30 Fotos
al-Dawayima
- Focusing on the village of al-Dawayima, the organization was able to outline critical historical context as an example of the other military campaigns that were conducted in conjunction.
© Getty Images
23 / 30 Fotos
Marathon Petroleum Corporation
- Forensic Architecture also investigated one of the largest refineries in the western hemisphere: Marathon Petroleum Corporation’s facility, located in Garyville, Louisiana.
© Getty Images
24 / 30 Fotos
Cancer risk
- The communities surrounding the area are subjected to a cancer risk seven times higher than the national average due to the toxic air surrounding the facility.
© Getty Images
25 / 30 Fotos
Chemical spill
- In August 2023, a hydrocarbon chemical mixture began leaking, amounting to the second-largest chemical spill in the last 30 years, according to the US Environmental Protection Agency.
© Shutterstock
26 / 30 Fotos
Increased hospitalizations
- The facility claimed that surrounding communities would not be affected, despite increased hospitalizations in the spill’s aftermath.
© Shutterstock
27 / 30 Fotos
Digital reconstruction
- Using satellite imagery, data mining, 3D modeling, and fieldwork, among other tools, Forensic Architecture was able to produce a digital reconstruction of the spill to demonstrate concentrations of pollutants in the atmosphere and how they, therefore, harmed communities in the region.
© Shutterstock
28 / 30 Fotos
Harm and accountability
- These phenomenal initiatives not only manage to provide a detailed overview of how events likely occurred but also attribute harm and accountability to the parties involved. Sources: (Al-Jazeera) (Bellingcat) (United Nations) (Open Source Investigations) (Neotas) See also: Must-see movies themed around journalism
© Shutterstock
29 / 30 Fotos
How public data is being used to investigate war crimes
Understanding one of journalism's most useful tools
© Getty Images
Open source investigations (OSINT) use tools like social media content, government records, satellite imagery, and other user-generated material to conduct in-depth investigations. Tapping into swathes of publicly available information, these investigations sift through data and information available online to analyze particular cases.
Organizations like Bellingcat and Forensic Architecture, as well as major publications, such as The New York Times and Al-Jazeera, among others, have managed to publish incredible journalistic pieces on the basis of open source investigations, merging journalism and forensic investigation in innovative ways.
Curious to know more? Click through to learn all about OSINT and cases where it has been used.
RECOMMENDED FOR YOU




































MOST READ
- Last Hour
- Last Day
- Last Week