
Batch geocoder for journalists Treeverse/README.md at master · paulgb/Treeverse Who posted what? DocumentCloud Twlets | Twitter to Excel Enterprise HLR Lookup Platform and API ’s Invitation Is Waiting For Your Response: An Investigative Guide To LinkedIn Whether you’re investigating a company purporting to have damning information on Robert Mueller or conducting research on anti-Islamic State foreign fighters in Iraq and Syria, LinkedIn can serve as a useful resource for online researchers across a wide variety of subjects. This guide aims to provide helpful tools and techniques for identifying LinkedIn profiles and for extracting information that will then allow you to pivot to other social media profiles belonging to the target. Some of the useful information you might glean from the social network for professionals include: Biographical details, including employment history, education and other affiliationsPersonal and work contact information Approximate locationProfile photoUsername Personal websiteEmployer’s websiteMembers of an individual’s social network Lock Your Profile Down Before beginning an investigation, there are a few steps you should take so that you can access as much content as possible and ensure your anonymity. Summary
A Guide to Open Source Intelligence (OSINT) Photo|Adobe Stock Introduction: Peering Behind the Mask Open source intelligence, which researchers and security services style OSINT, is one of the most valuable tools to a contemporary reporter, because of the vast amount of publicly available online information. Reporters conducting OSINT-based research should aspire to use the information they gather online to peer behind the superficial mask of the internet—the anonymous avatars on Twitter, for example, or the filtered photographs on Instagram—and tell the story of the real, flesh-and-blood human beings on the other side of our screens. Every time we go online, we give up part of our identity. The following guide is written to provide a basic foundation not only for doing that work, but also for verifying the information, archiving findings, and interacting with hostile communities online. Sign up for CJR's One: The Difference between Open and Closed Networks Open Networks Examples of Open Networks: Reporting on Public-Facing Content Maps
Finding emails when they don’t want to be found Hey there, reporters! Hope you liked J.C.’s guest post last week. This time I’m revisiting a tool I recommended a year ago. Initially, I only recommended their LinkedIn plugin, because their claims to find people’s emails addresses seemed a little… ambitious. But! Hunter’s shtick is that it will dig up emails on a certain domain – house.gov, for example. You can search for a certain person, but I didn’t have much success with that. Here’s my usual routine: Look for an official’s email address with the Finder tool. In all seriousness, this process works way better than I thought it would, which is why I’m recommending it now. IntelTechniques by Michael Bazzell Using Phone Contact Book Apps For Digital Research Popular apps such as TrueCaller or GetContact advertise the ability to see who is really calling you, even if you do not know the number, and alert the app user of spam or scam calls. However, the way that these apps gather information to determine the name of an unknown caller is not as broadly advertised. With many of these apps, this information comes as the result of vacuuming up the contact books of its users, then cross-referencing the data with other instances of the same number being used as well as with Facebook profiles that list a number. Most of these apps are smart enough to figure out that “Mom” or “Dad” is not a useful name to display for an incoming unknown number, but will often refer to the literal name given in a contact book, which can be incomplete, derogatory, or mnemonic. A fourth suspect traveled with a passport bearing the name of another member of the royal guard, Muhammed Saad Alzahrani. Getting Your Research Device Ready Phone Contact Book Apps GetContact Free?
Use Chrome Developer Tools to View Masked Phone Numbers for Free on a Popular People Search Site - Sean Lawson If you’ve ever searched online for your own name or the name of someone else, you’ve probably noticed that a lot of the results point to various people search websites like Spokeo, Intellius, and many others. Each site will typically provide a small amount of information about a person for free, offering more information for a fee. This information can potentially include current and past addresses, phone numbers, names of relatives, email addresses, social media profiles, and more. Because each site provides slightly different information, it is possible to put together a reasonably complete profile on someone just by aggregating all the free information from each site. This is why it’s a good idea to take stock periodically of what information about you or loved ones is available on such sites and have it removed, if possible. In some cases, these websites will provide partial information—like a partial phone number of email address—to entice you to pay for more. Like this:
Using deep web search engines for academic and scholarly research You may have heard the term in passing before, the rumored-but-rarely-talked-about topic of the “deep web”. A web underneath the web, filled with petabytes of data and information that’s out of the reach of your standard Google, Bing, or Yahoo search bar. But what is the deep web exactly, and what purpose does it serve for the greater research community as a whole? Read on in our guide to find out everything you need to know about the deep web, including what it means, where it lives, and how you can use it to your advantage. The Deep Web: A Proper Definition Google utilizes what’s known as a “spider-based crawler” to trawl the web for static webpage results, and then return them to you when you punch the right terms into the search bar. Any results you get back from a basic Google search are from what’s known as the “Surface Web”. See also: How to access the deep web and darknet How to Search the Deep Web One issue that some researchers run into though is the problem of paywalls. General
How to access the Dark Web safely: Step-by-Step Guide for 2022 Google only indexes a tiny fraction of the internet. By some estimates, the web contains 500 times more content than what Google returns in search results. The links that Google and other search engines return when you type in a query is known as the “surface web,” while all the other, non-searchable content is referred to as the “deep web” or “invisible web”. The dark net, or dark web, constitutes a small fraction of the deep web. See also: The best VPNs for Tor What is the dark web? The dark web, or dark net, is a small part of the deep web that is kept hidden on purpose. The type of site most commonly associated with the dark web are marketplaces where illicit goods such as narcotics, firearms, and stolen credit card numbers are bought and sold. More than that, though, the dark web contains content and data that can be accessed with anonymity. The beauty of the dark net is anonymity. How to access the Dark Web safely To access the vast majority of the dark web, you’ll need Tor. Freenet