Recipe of Success for Tech Investigations (Journalism)

Eight open source stories that leave a lasting impression are examined for their recipe for success.

Investigative research can be as multi-layered as a Prinzregententorte and make you droole: Illustration of a Prinzregententorte

Why all the talk about baking and cakes?

1. QATLAMA/Afghanistan

Afghan style dessert: QATLAMA — is a fried, layered bread baked in the kitchens of Central Asia. Qatlama means “folded” in traditional Turkish, which comes from the verb qatlamaq “to fold” and probably refers to the traditional method of preparation. The dessert is served with pistachios on top
The important ingredient that made this research possible: exclusive footage from security cameras that captured the slain Zemari Ahmadi and a total of 9 other civilians to their deaths, 7 of them children

Ingredients:

  • Exclusive access to footage from the security cameras that filmed the man who was killed
  • Answering the question “is the footage real,” using satellite data
    Interviewing colleagues of the man who was killed
  • Frame-by-frame image analysis of the container the slain man was carrying to determine guilt

Exclusive access to footage from the security cameras that filmed the man who was killed
Answering the question “is the footage real,” using satellite data
Interviewing colleagues of the man who was killed
Frame-by-frame image analysis of the container the slain man was carrying to determine guilt

2. Ekmek Kataifi/Greece

Ekmek Kataifi, typical dessert from Greece. It is a dessert based on syrupy kadaifi with fluffy cream and whipped cream. Kadafi, also called angel hair, is a sweet pastry from the Balkan-Levantine region. Conclusion: With nut and with lemon, fresh and delicious.
Bellinggat/Lighthouse Reports
Bellingcat Pushback Story: In reviewing the events involving the migrants in the inflatable boat, we first used social media sources. Alarm Phone, an independent group that provides a hotline for migrants in distress at sea, tweeted that it had lost contact with the group involved in the June 4 incident at 3 p.m., and later confirmed at 7 p.m. that the group had been rescued by the Turkish coast guard.

Ingredients:

  • AIS tracking data of some Frontex ships purchased
  • Combined with data where pushbacks were reported by migrants and organizations (NGOs)
  • Analysis of social media posts
  • Geoanalysis of a pushback situation, temporally and spatially analyzed.

3. Esterházytorte/Austria

Esterházy cake: The Esterházy cake consists of a butter cream flavored with cognac or vanilla and sandwiched between four to five layers of almond meringue (macaron) dough. The cake is covered with a fondant icing and decorated with a characteristic chocolate stripe pattern. However, there are many different recipe variations. In Hungary, the original almonds have been completely replaced by walnuts.
Verification of the location through an image that the account posts on social media
Firmennetzwerk aus offenen Daten

Ingredients:

  • A previous/old VK account, in which the person reveals his family network
  • Online obituary of the father
  • Matching of the family network through social media analysis (SOCINT)
  • Geolocation verification of a post leading to the target person
    Search for final papers of the target person (not target specific, but still exciting)
  • Photo matching: a pond found at the person’s address as well

4. Kyiv Cake

Sponge cake layers with a crunchy meringue layer with hazelnuts, filled with jam and a buttercream-like icing (link)
OSINT journalists’ new strategy: phone metadata for conversations of senior Russian military personnel: https://twitter.com/bellingcat/status/1144697596109295618
The two Telegram lookup databases to elicit information about Russian citizens

Ingredients:

  • Telegram lookup data to find the identity of people who have a specific address.
  • Cell tower metadata: Phone lists: Bellingcat has acquired phone metadata of a senior person in the institution. Data is purchased from brokers offering such services. The Russian black market has made it possible for data journalists and activists to conduct research into numerous important investigations into the country’s military and intelligence services in recent years.
  • Interviews with the accused on the phone

5. Tamriyeh/Palästina

Tamriyeh, a traditional Palestinian dessert, from the Nablus region. Crispy golden shell in a rich semolina pudding scented with orange water and rose petals.
https://sketchfab.com/Scan.guy/collections/ukraine-03990e7debb44796a9a8ec3462e486a4
3D model of a bombed house, the hotel “Ukraine” in the city of Chernihiv.

Ingredients:

  • Acquisition of “new” video footage
  • Tool to enter the exact locations of the perpetrators and the journalists in a timely manner

6. Kıbrıs Tatlısı/Zyperns Dessertkuchen

Kıbrıs Tatlısı (Cyprus dessert cake) has been a very popular dessert in Turkey since the last decade. Instead of flour, coconut flakes, bread crumbs and walnuts are added to the cake batter. The cake is topped with simple syrup and topped with a silky cream. This combination is a real taste hit.
xHamster: Wer steckt hinter der Pornoplattform? | STRG_F

Ingredients

  • Checking the domain registration data
  • Analysis of documents and data from the Cyprus Trade Register
  • Xhamster Profile Analytics
  • Conversation with concerned parties
  • Talk with colleagues/employees involved with Wisebits company7. Afrikanische Leckereien aus Malawi: Mbatata Cookies
Mbatata Cookies: Mbatata from Malawi are easy to prepare sweet potato cookies that are soft and cakey, making them the perfect healthy cookie recipe to satisfy your cookie cravings
Link: https://youtu.be/I0DJlSqlmEw

Ingredients

  • Social media video analysis
  • Geolocating the location
  • Find company in one of the videos

8. Bamberger Gebäck/Bamberg-Germany

A Franconian croissant, but is a Danish pastry, which is a little slimmer
https://cleantalk.org/blacklists
NameChk tool to find usernames on social media

Ingredients

  • Darknet research on Crimenetwork
  • IP address of the perpetrators by email tracker
  • IP address matching with blacklists (here Auktionshilfe.info, here was warned, so one hit)
  • Profile analysis of metadata of a PDF on training of financial agents, sent by perpetrator to victim (with NameChecker)
  • Domain registration of the fake job site recruiting people, (missing due to anonymization service)
  • Phone number analysis of scammers mentioned in emails with victims (dead end)
  • Crypto address analysis: money sent from victim accounts to perpetrators (no names, but you can find the amount of income and bitcoin mixing)

PS: Using right baking pans:

--

--

Investigative journalist with a technical edge, interested in open source investigations, satellite imgs, R, python, AI, data journalism and injustice

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Techjournalist

Investigative journalist with a technical edge, interested in open source investigations, satellite imgs, R, python, AI, data journalism and injustice