Articles

Link

Description

Good information on how to protect your FB account.

Guide to Archiving Video.

Page describing all search commands that you can do in Google search.

After reading this guide, hopefully you will not only know how to use this tool set, but also how to use creativity in avoiding dead ends.

This how-to covers two things: the basic steps for using open-source metadata extraction software on your desktop; and secondly how to extract geo-location information from a large number of images.

This book aims to provide you with knowledge and handy tips on how to communicate safer online. We primarily turn to people who have information they want to come out to the public - tips and counselors. In Swedish.

This guide is produced in collaboration with the Swedish Journalist Association and is full of case studies, solutions and concrete tips on how to be a journalist to protect your material and sources in your daily work. In Swedish.

Page describing search options that you can do in Facebook.

15 different tips to better find information on Facebook.

Develop a tool where you can target a particular Bitcoin address, visualize the transactions flowing in and out of it and then perform secondary dark web searches using Webhose.io to see if you can find hidden services where the bitcoin wallets have been mentioned. You will of course visualize all of this so that you can explore the data when you are finished.

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.

The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.

Techniques used by newsrooms, investigative organisations, security auditors as well as tech savvy criminals to query various search engines for information hidden on public websites and vulnerabilities exposed by public servers.

Discover digital tools that can improve your journalism.

Learn search operators in Google, such as searching for a specific filetype (e.g. PDF) or on a specific website.

This case-study focuses on gathering geo-location data from images posted to Instagram to tell stories of abuse of power and putting at risk those that need protecting. We look at what image metadata is, where to find it and how it can be used to expose abuses of power, protect those at risk and verify that an event took place.

Guide to website data scraping.

Learn to clean data in a spreadsheet.

Article on how to get started in online investigations with open-source information.

Learn about Poynter, The International Fact-Checking Network.

The Swedish Union of Journalists, together with the Internet Fund, has run a project to investigate the criminal law aspects of supporting Tor. The Tor anonymization tool is a way for journalists to safeguard their sources digitally. It is also used to surf the Internet in countries where online freedom of expression is cropped. In Swedish.

Article on how to get information by searching with images

BBC article by Paul Myers.

Practice your source-critical thinking - get to know the sources you share and let nobody fool you! In Swedish.

Page describing all search commands that you can do in Twitter.

A guide to online search and research technology.

Fact-checker’s guide.