Jump to content

Investigations: Difference between revisions

From Archive
Create stub: Investigations
 
Major expansion: complete methodology - research phases, OSINT, document analysis, interviews, verification, case management
 
Line 1: Line 1:
''Page under development.''
= Investigations =


Methods, tools, and approaches for investigative journalism.
[[File:Watergate complex.jpg|thumb|right|280px|Watergate - every investigation starts somewhere you don't expect]]


== Topics to Cover ==
'''Investigations''' is the systematic process of uncovering hidden truths through research, documentation, and source development. This page covers methodology for investigative journalism.
* Open source intelligence (OSINT)
 
* Document analysis
== Core Framework ==
* Interview techniques
 
* Verification methods
Every investigation answers three questions:
# '''What happened?''' (Establish facts)
# '''Who's responsible?''' (Identify actors)
# '''Why does it matter?''' (Demonstrate impact)
 
The order matters. Facts first, then actors, then stakes. Never work backward from a conclusion.
 
== Research Phases ==
 
=== Phase 1: Hypothesis Development ===
 
Before investigating, you need a question worth answering:
 
* What's the tip or lead?
* What would proving it require?
* What would disproving it require?
* Who benefits if it's true? Who's harmed?
* What's already public?
 
'''Document everything from day one.''' Your future self will thank you.
 
=== Phase 2: Background Research ===
 
Build the knowledge foundation:
 
* '''Public records:''' Court filings, property records, corporate registrations
* '''News archives:''' What's already been reported?
* '''Academic literature:''' Who studies this topic?
* '''Industry publications:''' Trade journals, professional forums
* '''Social media:''' Who talks about this publicly?
 
Goal: Know more about the topic than most people before making a single call.
 
=== Phase 3: Document Collection ===
 
Gather primary sources:
 
* '''[[FOIA]] requests:''' File early, file often, file everywhere
* '''Court records:''' PACER (federal), state court systems
* '''SEC filings:''' EDGAR for corporate disclosures
* '''Lobbying disclosures:''' OpenSecrets, state databases
* '''Campaign finance:''' FEC, state election boards
* '''Property records:''' County assessor, recorder offices
 
'''Organize obsessively.''' File naming conventions. Date prefixes. Backup everything.
 
=== Phase 4: Source Development ===
 
See [[Source Handling]] for detailed guidance. Key principles:
 
* '''Start at the edges:''' Former employees, competitors, regulators
* '''Work toward the center:''' Build knowledge before approaching principals
* '''Verify independently:''' Never rely on a single source for key facts
* '''Protect absolutely:''' Source safety trumps story
 
=== Phase 5: Analysis ===
 
Make sense of what you've gathered:
 
* '''Timeline construction:''' What happened when?
* '''Network mapping:''' Who connects to whom?
* '''Pattern identification:''' What repeats?
* '''Gap analysis:''' What's missing? What questions remain?
 
== OSINT Techniques ==
 
Open Source Intelligence - extracting information from public sources:
 
=== People Research ===
 
{| class="wikitable"
! Source !! What It Shows
|-
| Voter registration || Address, party affiliation, voting history
|-
| Property records || Ownership, transactions, value
|-
| Court records || Lawsuits, judgments, criminal history
|-
| Professional licenses || Credentials, disciplinary actions
|-
| Corporate records || Directorships, ownership stakes
|-
| Social media || Connections, timeline, interests
|}
 
=== Corporate Research ===
 
* '''EDGAR:''' 10-K (annual), 10-Q (quarterly), 8-K (events), proxy statements
* '''State SOS:''' Incorporation documents, registered agents, annual reports
* '''UCC filings:''' Security interests, lending relationships
* '''Litigation:''' PACER, state courts, arbitration records
* '''Regulatory:''' Industry-specific databases (FINRA, FDA, etc.)
 
=== Digital Investigation ===
 
* '''Domain WHOIS:''' Historical registration (archive services)
* '''Web Archive:''' Wayback Machine for deleted content
* '''Reverse image search:''' Google, TinEye, Yandex
* '''Metadata:''' Document properties, photo EXIF data
* '''Social graphs:''' Connection analysis across platforms
 
== Document Analysis ==
 
=== Authenticity Assessment ===
 
Before relying on any document:
 
* '''Provenance:''' Where did it come from?
* '''Format:''' Consistent with era/organization?
* '''Content:''' Matches known facts?
* '''Context:''' Why does this document exist?
 
=== Extraction Techniques ===
 
* '''OCR:''' Convert scanned documents to searchable text
* '''PDF analysis:''' Extract embedded data, metadata
* '''Spreadsheet analysis:''' Pivot tables, VLOOKUP, conditional formatting
* '''Database queries:''' SQL for structured data
* '''Visualization:''' Timeline tools, network diagrams
 
== Interview Techniques ==
 
=== Preparation ===
 
* '''Know the subject:''' Research thoroughly before contact
* '''Know your questions:''' Written list, prioritized
* '''Know your recording:''' Legal requirements, consent rules
* '''Know your limits:''' What can you promise?
 
=== Execution ===
 
'''Opening:''' Establish rapport, explain purpose, set ground rules.
 
'''Core interview:'''
* Ask open-ended questions first
* Let silence work for you
* Follow up on specifics
* Circle back to key points
* Watch for inconsistencies
 
'''Closing:'''
* "Is there anything else I should know?"
* "Who else should I talk to?"
* "What documents would support this?"
* "How can I reach you if I have follow-up questions?"
 
=== Documentation ===
 
* Record if legally permitted and consented
* Take detailed contemporaneous notes
* Document demeanor, setting, non-verbal cues
* Transcribe key quotes immediately after
 
== Verification Standards ==
 
=== Multi-Source Confirmation ===
 
For sensitive claims:
* '''Two-source minimum:''' Independent corroboration
* '''Three sources ideal:''' Multiple perspectives
* '''Documentary backup:''' Paper trail when possible
 
=== Hostile Verification ===
 
Before publishing:
* Can you prove it to a skeptic?
* What's the strongest counter-argument?
* What would the subject say in response?
* Are you prepared to defend it in court?
 
=== Pre-Publication Checklist ===
 
* [ ] Facts verified by multiple sources
* [ ] Documents authenticated
* [ ] Subject given opportunity to respond
* [ ] Legal review completed
* [ ] Editor signoff obtained
* [ ] Publication ethics satisfied
 
== Case Management ==
 
=== Organization System ===
 
<pre>
/investigation-name/
  /documents/
    /foia/
    /court-records/
    /corporate/
    /misc/
  /interviews/
    /transcripts/
    /notes/
  /analysis/
    /timelines/
    /network-maps/
  /drafts/
  /published/
  chronology.md
  sources.md (encrypted)
  questions.md
</pre>
 
=== Security ===
 
* '''Encrypted storage:''' VeraCrypt, LUKS
* '''Secure communication:''' Signal, SecureDrop
* '''Source protection:''' Compartmentalized files
* '''Backup:''' Multiple locations, encrypted
 
== Legal Considerations ==
 
'''Know your protections:'''
* Shield laws (state-specific)
* Reporter's privilege
* First Amendment defense
 
'''Know your risks:'''
* Defamation liability
* SLAPP suits
* Subpoena threats
* Physical security
 
'''Consult counsel:'''
* Before publishing sensitive material
* When approached by subjects
* If served with legal process
 
== Related ==
 
* [[FOIA]] - Freedom of Information requests
* [[Source Handling]] - Protecting confidential sources
* [[Data Journalism]] - Using data for stories
* [[Journalism]] - Broader journalism practice
* [[Threat Modeling]] - Security planning
 
== References ==
 
* [https://www.ire.org/ Investigative Reporters and Editors]
* [https://gijn.org/ Global Investigative Journalism Network]
* [https://cpj.org/ Committee to Protect Journalists]
* [https://www.occrp.org/ OCCRP]
 
[[Category:Journalism]]
[[Category:Investigations]]
[[Category:OSINT]]


{{Navbox Journalism}}
{{Navbox Journalism}}
[[Category:Journalism]]

Latest revision as of 05:41, 15 January 2026

Investigations

Watergate - every investigation starts somewhere you don't expect

Investigations is the systematic process of uncovering hidden truths through research, documentation, and source development. This page covers methodology for investigative journalism.

Core Framework

Every investigation answers three questions:

  1. What happened? (Establish facts)
  2. Who's responsible? (Identify actors)
  3. Why does it matter? (Demonstrate impact)

The order matters. Facts first, then actors, then stakes. Never work backward from a conclusion.

Research Phases

Phase 1: Hypothesis Development

Before investigating, you need a question worth answering:

  • What's the tip or lead?
  • What would proving it require?
  • What would disproving it require?
  • Who benefits if it's true? Who's harmed?
  • What's already public?

Document everything from day one. Your future self will thank you.

Phase 2: Background Research

Build the knowledge foundation:

  • Public records: Court filings, property records, corporate registrations
  • News archives: What's already been reported?
  • Academic literature: Who studies this topic?
  • Industry publications: Trade journals, professional forums
  • Social media: Who talks about this publicly?

Goal: Know more about the topic than most people before making a single call.

Phase 3: Document Collection

Gather primary sources:

  • FOIA requests: File early, file often, file everywhere
  • Court records: PACER (federal), state court systems
  • SEC filings: EDGAR for corporate disclosures
  • Lobbying disclosures: OpenSecrets, state databases
  • Campaign finance: FEC, state election boards
  • Property records: County assessor, recorder offices

Organize obsessively. File naming conventions. Date prefixes. Backup everything.

Phase 4: Source Development

See Source Handling for detailed guidance. Key principles:

  • Start at the edges: Former employees, competitors, regulators
  • Work toward the center: Build knowledge before approaching principals
  • Verify independently: Never rely on a single source for key facts
  • Protect absolutely: Source safety trumps story

Phase 5: Analysis

Make sense of what you've gathered:

  • Timeline construction: What happened when?
  • Network mapping: Who connects to whom?
  • Pattern identification: What repeats?
  • Gap analysis: What's missing? What questions remain?

OSINT Techniques

Open Source Intelligence - extracting information from public sources:

People Research

Source What It Shows
Voter registration Address, party affiliation, voting history
Property records Ownership, transactions, value
Court records Lawsuits, judgments, criminal history
Professional licenses Credentials, disciplinary actions
Corporate records Directorships, ownership stakes
Social media Connections, timeline, interests

Corporate Research

  • EDGAR: 10-K (annual), 10-Q (quarterly), 8-K (events), proxy statements
  • State SOS: Incorporation documents, registered agents, annual reports
  • UCC filings: Security interests, lending relationships
  • Litigation: PACER, state courts, arbitration records
  • Regulatory: Industry-specific databases (FINRA, FDA, etc.)

Digital Investigation

  • Domain WHOIS: Historical registration (archive services)
  • Web Archive: Wayback Machine for deleted content
  • Reverse image search: Google, TinEye, Yandex
  • Metadata: Document properties, photo EXIF data
  • Social graphs: Connection analysis across platforms

Document Analysis

Authenticity Assessment

Before relying on any document:

  • Provenance: Where did it come from?
  • Format: Consistent with era/organization?
  • Content: Matches known facts?
  • Context: Why does this document exist?

Extraction Techniques

  • OCR: Convert scanned documents to searchable text
  • PDF analysis: Extract embedded data, metadata
  • Spreadsheet analysis: Pivot tables, VLOOKUP, conditional formatting
  • Database queries: SQL for structured data
  • Visualization: Timeline tools, network diagrams

Interview Techniques

Preparation

  • Know the subject: Research thoroughly before contact
  • Know your questions: Written list, prioritized
  • Know your recording: Legal requirements, consent rules
  • Know your limits: What can you promise?

Execution

Opening: Establish rapport, explain purpose, set ground rules.

Core interview:

  • Ask open-ended questions first
  • Let silence work for you
  • Follow up on specifics
  • Circle back to key points
  • Watch for inconsistencies

Closing:

  • "Is there anything else I should know?"
  • "Who else should I talk to?"
  • "What documents would support this?"
  • "How can I reach you if I have follow-up questions?"

Documentation

  • Record if legally permitted and consented
  • Take detailed contemporaneous notes
  • Document demeanor, setting, non-verbal cues
  • Transcribe key quotes immediately after

Verification Standards

Multi-Source Confirmation

For sensitive claims:

  • Two-source minimum: Independent corroboration
  • Three sources ideal: Multiple perspectives
  • Documentary backup: Paper trail when possible

Hostile Verification

Before publishing:

  • Can you prove it to a skeptic?
  • What's the strongest counter-argument?
  • What would the subject say in response?
  • Are you prepared to defend it in court?

Pre-Publication Checklist

  • [ ] Facts verified by multiple sources
  • [ ] Documents authenticated
  • [ ] Subject given opportunity to respond
  • [ ] Legal review completed
  • [ ] Editor signoff obtained
  • [ ] Publication ethics satisfied

Case Management

Organization System

/investigation-name/
  /documents/
    /foia/
    /court-records/
    /corporate/
    /misc/
  /interviews/
    /transcripts/
    /notes/
  /analysis/
    /timelines/
    /network-maps/
  /drafts/
  /published/
  chronology.md
  sources.md (encrypted)
  questions.md

Security

  • Encrypted storage: VeraCrypt, LUKS
  • Secure communication: Signal, SecureDrop
  • Source protection: Compartmentalized files
  • Backup: Multiple locations, encrypted

Know your protections:

  • Shield laws (state-specific)
  • Reporter's privilege
  • First Amendment defense

Know your risks:

  • Defamation liability
  • SLAPP suits
  • Subpoena threats
  • Physical security

Consult counsel:

  • Before publishing sensitive material
  • When approached by subjects
  • If served with legal process

References


Journalism & Investigations
Core Journalism · Investigations · Source Handling
Methods FOIA · Data Journalism · Dataviz · Documentation Discipline
Tools ArchiveBox · Scrapbook-core · Personal APIs
Culture Hacker Culture · PGP Communication Guide