Difference between revisions of "Bellingcat"

From Wikispooks
Jump to navigation Jump to search
m (date)
(date/time of photo)
Line 10: Line 10:
  
 
On 18 Jul 2014, Belingcat "''Found The Buk Missile Launcher That Downed Flight MH17''" - though the photograph, widely claimed to have been taken in the town of Snizhne,  was actually taken in the town of Torez and under weather conditions significantly different to those on the day of the MH17 crash.<ref>[https://www.kickstarter.com/projects/1278239551/bellingcat/posts/919158 How Open Source Investigation Found The Buk Missile Launcher That Downed Flight MH17]</ref>
 
On 18 Jul 2014, Belingcat "''Found The Buk Missile Launcher That Downed Flight MH17''" - though the photograph, widely claimed to have been taken in the town of Snizhne,  was actually taken in the town of Torez and under weather conditions significantly different to those on the day of the MH17 crash.<ref>[https://www.kickstarter.com/projects/1278239551/bellingcat/posts/919158 How Open Source Investigation Found The Buk Missile Launcher That Downed Flight MH17]</ref>
<ref>[https://bellingcat.com/resources/case-studies/2014/07/18/identifying-the-location-of-the-mh17-linked-missile-launcher-from-one-photograph/ Identifying the Location of the MH17 Linked Missile Launcher From One Photograph]</ref>
+
<ref>[https://bellingcat.com/resources/case-studies/2014/07/18/identifying-the-location-of-the-mh17-linked-missile-launcher-from-one-photograph/ Identifying the Location of the MH17 Linked Missile Launcher From One Photograph]</ref> Eliot Higgins (proprietor of Bellingcat: known for investigative social media and weapons analysis) didn't consider '''when the photograph was taken''' to be important.
 +
[https://wp4553-flywheel.netdna-ssl.com/wp-content/uploads/2014/07/buk-possible-site.jpg.jpg The photo used by Bellingcat] in the "investigation" as to the location of the BUK was uploaded on 18 July 2014 at 18:26:41. This "investigation" as to the location of the BUK" is an unusual way to go about things.  Why not simply ask the person who took it or whoever supplied it?  And why not ask when it was taken?
  
 
On 23 Aug 2014, Belingcat made an estimate of the exact location where the James Foley execution video was made (outside Raqqa, an Islamic State stronghold in north-central Syria)<ref>[https://bellingcat.com/resources/case-studies/2014/08/23/the-hills-of-raqqa-geolocating-the-james-foley-video/ The Hills of Raqqa – Geolocating the James Foley Video]</ref>,  yet failed to notice that the video itself was a fake<ref>[http://www.liveleak.com/view?i=097_1408853926 James Foley FAKE Execution - Video Analysis Reveals the Truth]</ref>
 
On 23 Aug 2014, Belingcat made an estimate of the exact location where the James Foley execution video was made (outside Raqqa, an Islamic State stronghold in north-central Syria)<ref>[https://bellingcat.com/resources/case-studies/2014/08/23/the-hills-of-raqqa-geolocating-the-james-foley-video/ The Hills of Raqqa – Geolocating the James Foley Video]</ref>,  yet failed to notice that the video itself was a fake<ref>[http://www.liveleak.com/view?i=097_1408853926 James Foley FAKE Execution - Video Analysis Reveals the Truth]</ref>

Revision as of 19:11, 12 September 2014

https://bellingcat.com/ : "by and for citizen investigative journalists" Choose random, anonymous (and probably fake) images from social media to suit whatever point you want to make - no need for any verification whatsoever.

In Oct 2012, Eliot Higgins was laid off from his job as an administrator at a nonprofit providing housing for asylum seekers.

In Aug 2013, Eliot Higgins noticed Twitter reports of a possible chemical-weapons attack in Ghouta, a suburb of Damascus.

In Nov 2013, Eliot Higgins "confirmed" that Syria had used chemical weapons[1], without noticing that it was not the Syrian government that carried out the attacks[2].

On 15 Jul 2014, Eliot Higgins started a new website called Bellingcat for citizen journalism to investigate current events using open source information such as videos, maps and pictures. It was funded by a Kickstarter campaign (£50,891 at 11 Sep 2014 from 1,701 backers).

On 18 Jul 2014, Belingcat "Found The Buk Missile Launcher That Downed Flight MH17" - though the photograph, widely claimed to have been taken in the town of Snizhne, was actually taken in the town of Torez and under weather conditions significantly different to those on the day of the MH17 crash.[3] [4] Eliot Higgins (proprietor of Bellingcat: known for investigative social media and weapons analysis) didn't consider when the photograph was taken to be important. The photo used by Bellingcat in the "investigation" as to the location of the BUK was uploaded on 18 July 2014 at 18:26:41. This "investigation" as to the location of the BUK" is an unusual way to go about things. Why not simply ask the person who took it or whoever supplied it? And why not ask when it was taken?

On 23 Aug 2014, Belingcat made an estimate of the exact location where the James Foley execution video was made (outside Raqqa, an Islamic State stronghold in north-central Syria)[5], yet failed to notice that the video itself was a fake[6] [7].

On 08 Sep 204, Belingcat claimed "New evidence has been found that shows the Buk missile system that was used to shoot down MH17 on the 17th of July came from Russia, and was most likely operated by Russian soldiers."[8]. The source for there being a Russian BUK in Ukraine is The Ministry of internal Affairs of Ukraine. It is shown on a civilian transporter, whereas those shown in Russia are on military transporters. It is alleged to have been in Luhansk and heading towards the Russian border, which is not the ideal route for getting from Torez to Russia. It has a white patch on its right-hand side and no railings: basically, that's it. This "new evidence" has been manipulated into the Wikipedia article, courtesy of the accounts: My very best wishes, Sayerslle, Geogene, Stickee and Martinevans123 [1] [2]


 

Related Quotations

PageQuoteAuthorDate
Anatoly Shariy“[...], according to many experts, it's an MI6 organization.”Anatoly Shariy18 October 2020
Zinc Network“Bringing together organisations including Zinc Network, the Institute for Statecraft, Aktis Strategy, Bellingcat, DFR Lab, the Media Diversity Institute, Toro Risk Solutions and Ecorys, our Consortium combines recognised market leaders in understanding, monitoring, and countering Kremlin-backed disinformation... This ecosystem of credible voices will continue to grow, exposing the actors and networks behind Kremlin-backed disinformation, reducing unwitting multipliers of disinformation, and building resilience amongst key target audiences across Europe.

We will mobilise a Network Hub based in London, led by an experienced Project Director, consisting of an agile team with core competencies augmented by a wider pool of vetted experts. Our approach is highly localised, based around regional clusters of actors who can collaborate to effectively undermine the disinformation

ecosystem in their respective areas and engage audiences most vulnerable to disinformation... It is a highly complex project involving coordination of many independent actors, and thus risk must be carefully managed and risk profiles constantly adapted, serving as the basis for all activity. The approach we propose is based on the identification, monitoring and management of risks as they materialise, allowing members to continue taking smart risks as they increase the scale and impact of their activities.”

 

Sponsors

EventDescription
Adam Smith InternationalLondon-based consultancy charged with overseeing the overseas work of the Adam Smith Institute. Used by British intelligence services to train puppet police forces in the Middle East.
Adessium FoundationA secretive Dutch foundation that donates to projects backed by Western governments.
Google News InitiativeGoogle and the deep state buying domination over corporate media and creating tools to censor independent voices.
National Endowment for DemocracyThe "traditional intermediary of the CIA", promoting the US "national interest" abroad by financing groups and individuals.
ProtonMailEmail and VPN server originally located in formally neutral Switzerland to avoid US/NATO surveillance or "information requests", but this has been hollowed out.
Sigrid Rausing Trust
Swedish Postcode Foundation

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:British govt funded plan for censorship of factual NATO criticismArticle3 October 2023Jack PoulsonLeaked documents reveal British intel contractor Zinc Network singled out The Grayzone’s Max Blumenthal for online censorship, and seeks to redefine factual criticism of NATO as disinformation
Document:Metropolitan Police on 'Chepiga' and 'Mishkin'blog post12 October 2018Craig MurrayI remain of the view that the best way forward would be for Putin to negotiate conditions under which Boshirov and Petrov might voluntarily come to the UK for trial
Document:Staged ISIS Videos are the Plot of Iron Man 3article14 September 2014Jay DyerPredictive programming and fake news - an analysis of the ISIS 'beheading' videos and 'Iron Man 3'
Document:Upskilling to Upscale: Unleashing the Capacity of Civil Society to Counter Disinformationproject planJune 2018Integrity InitiativeA central II-document. The master plan for a huge network of British-directed NGOs in Europe. ‘Disinformation’ refers to everything not fitting the Western government narrative...
Document:Why some people are spreading false rumours about the Texas gunmanArticle9 May 2023Shayan Sardarizadeh
Mike Wendling
The BBC factchecks the recent 2023 Allen, Texas outlet mall shooting regarding the alleged Nazism of the Hispanic shooter


Rating

5star.png 17 January 2020 Terje 
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References

External links

Use on Wikipedia so far