Bellingcat (stylized as bell¿ngcat) is an investigative journalism website that specializes in fact-checking and open-source intelligence (OSINT).[1] It was founded by the British journalist and former blogger Eliot Higgins in July 2014. Bellingcat publishes the findings of both professional and citizen journalist investigations into war zones, human rights abuses, and the criminal underworld. The site's contributors also publish guides to their techniques, as well as case studies.[2]

Type of site
Investigative journalism
Available inEnglish, Russian
Created byEliot Higgins
Launched2014 (2014)

Bellingcat began as an investigation of the use of weapons in the Syrian civil war. Its reports on the War in Donbass (including the downing of Malaysia Airlines Flight 17), the El Junquito raid, Yemeni Civil War, Skripal poisoning and a mass-killing by the Cameroonian Army have attracted international attention.


The name derives from the idiom "belling the cat", which comes from a medieval fable about mice who discuss how to make a cat harmless. One suggests hooking a bell around his neck, and all the mice support the idea but none is willing to do it.[3]


In March 2012, Eliot Higgins started a blog under the pseudonym Brown Moses, through which he published his research into video footage of the Syrian Civil War.[4] He looked at hundreds of these short clips on the Internet, localized them, and examined details of the weapons used. As a result, Higgins was able to demonstrate that the Syrian regime was using cluster munitions and chemical weapons.[5][6] In 2013, Higgins linked the significant chemical attack in Ghouta (the Ghouta chemical attack) to Bashar al-Assad.[7]

Bellingcat's first major investigation, done mainly by volunteers without external funding,[8] was the downing of Malaysia Airlines Flight 17 (MH17) in 2014. Their conclusion that Russia was responsible was later confirmed by the Joint Investigation Team (JIT), which found in a report dated 25 May 2018 that the downing of MH17 was initiated by the Russian military.[9] In other notable investigations using Google Earth, volunteer investigators working with Bellingcat said that they had discovered the coordinates of an Islamic State training camp, as well as the site where an American journalist was killed.[10]

Kristyan Benedict, an Amnesty International campaign manager, told The New Yorker in 2013 that many organisations had analysts but that Higgins was faster than many established investigation teams.[11]

Higgins launched the Bellingcat platform in 2014 with the help of private donations received through the crowdfunding platform Kickstarter,[12] and performed additional crowdfunding in 2017.[8] Half of funding comes from grants and donations, the other half from running workshops training people in the art of open-source investigations.[13][8] For example, Bellingcat has received grants from Adessium, Digital News Initiative, Open Society Foundation, Pax, Porticus, National Endowment for Democracy and The Dutch Postcode Lottery.[14][8] Higgins has said much of the grant money does not directly fund investigations and is used for support services such as document translations and training.[8] The organisation publishes guides on how to analyse data and how to create reports, such as "How to Scrape Interactive Geospacial Data" and "How to Identify Burnt Villages by Satellite Imagery".[13]

Higgins told that grants from the NED and OSF pay for Bellingcat programs to help journalists and researchers in their investigations.[8] He further clarified that "Most our funding from grants (i.e. NED, OSF etc.) covers stuff that isn't related to investigating anything Russia related."[8][1][2][15][16][17][18]

According to the newspaper i, Bellingcat is notable for its transparency, as Bellingcat investigative journalism pieces detail "how they found out the story and which techniques they used".[19]

As of 2019, the company has sixteen[1] full-time staff plus Higgins, and at least 60 contributors.[13] Its office is in Leicester.[13]

Notable cases

War in eastern Ukraine

On 21 December 2016, a report by Bellingcat was published which analyses the use of Russian artillery in the summer of 2014 against Ukrainian villages.[20]


On July 17, 2014 Malaysia Airlines Flight 17, a passenger flight from Amsterdam to Kuala Lumpur, was shot down while flying over eastern Ukraine. All 283 passengers and 15 crew members died after the Boeing 777 was hit by a burst of "high-energy objects".[21]

In a press conference, Russian officials blamed the flight's destruction on Ukrainian forces and presented radar data, expert testimony and a satellite image. The radar data that showed another aircraft in the vicinity of MH17 was debunked as falling debris from MH17 by experts. A Spanish air traffic controller in Kiev gave interviews that stated that two Ukrainian fighter jets followed the Malaysian plane but the Spanish embassy later said that there was no Spanish air traffic controller at either of Kiev's airports. The satellite image showed an aircraft firing on the airliner but Bellingcat exposed the photo as a composite of Google images, with the Malaysian airline logo even being misplaced.[22]

On November 9, 2014, the Bellingcat MH17 Investigation team published a report titled "MH17: Source of the Separatists' Buk". Based on evidence from open sources, primarily social media, the report links a Buk missile launcher that was filmed and photographed in eastern Ukraine on July 17 to the downing of the MH17 flight. The 35 page report, including photographs and maps, details the movements of the Buk in eastern Ukraine on July 17, evidence that the Buk originated from the 53rd Anti-Aircraft Rocket Brigade in Kursk, Russia, along with a convoy headed towards the Ukrainian border, and the activity of the vehicles seen in the same convoy after July 17.[23] This report was later echoed by the Dutch-led international Joint Investigation Team. The head of the Netherlands' National Crime Squad, said they officially concluded that the missile that shot down MH17 "is from the 53rd anti-aircraft missile brigade from Kursk in the Russian Federation".[24]

In June 2015, Bellingcat published evidence that Russia had used Adobe Photoshop to manipulate satellite images of the MH17 disaster. Image forensics expert Jens Kriese of Germany maintained that Bellingcat's report used invalid methods to reach its conclusion.[25] In a follow-up report, Bellingcat published crowdfunded satellite imagery and further analysis that supported their claim.[26]

On December 20, 2017, Bellingcat published an article focusing on a section of the 2017 Intelligence and Security Committee report, which categorically stated that the British stance on the MH17 incident was that Russian forces were behind the orchestration and implementation of a plan to shoot down an aircraft. Whether the target was the MH17 passenger jet is not defined.[27][28]

Syrian Civil War

Beginning in March 2011 after political protests turned violent,[29] the Syrian Civil War has been an ongoing conflict between the Syrian Arab Republic, Syrian Opposition, Islamic State of Iraq and the Levant, and other combatants. Bellingcat reports primarily analyse the factions at war, and what weapons and armor they utilize, as well as news that would normally go unreported by the mainstream media. Bellingcat utilizes a network of contributors who specialize in open source and social media investigation, and creates guides and case studies so others may learn to do the same.[2]

In April 2014, Bellingcat published extensive evidence of chemical weapons being used on Syrian civilians, including children. Collecting and analysing video footage from local sources which apparently showed parts of chlorine cylinders, Higgins said that while the contents of the cylinders could not be verified "the injuries depicted in the videos all appear to be consistent with chemical exposure".[30]

In June 2016, Bellingcat published an article showing the use of cluster munitions were being used against the New Syrian Army, in clear violation of the Convention on Cluster Munitions. Bellingcat provided photographic evidence from firsthand sources that the munitions used were identical to those used by the Russian military.[31]

In February 2017, Bellingcat published an article detailing how rudimentary drones were being used by ISIS to drop explosives onto opposition targets. Analysing footage from Twitter and other social media platforms, it was discovered that the drones were dropping modified 40mm grenades.[32]

Bellingcat also does extensive reporting into attacks that are not openly claimed by combatants.

In September 2016, Bellingcat released a fact-checking article in response to Russia denying the bombing of hospitals in Syria. The article analysed footage from YouTube and images from Facebook, cross-referencing them with areas that were confirmed to be attacked by Russian forces. The article reported that the hospital in question was within the area under Russian attack, although Russia denies these claims.[33]

In March 2017, Bellingcat published an investigative report on the bombing of a mosque in Aleppo that killed over 50 civilians. The article included photographs of the remnants of the bomb used, and showed that the piece was identical to that of similar bombs used by the US military.[34]

El Junquito raid

In May 2018, in partnership with Forensic Architecture and Venezuelan journalists, Bellingcat collected, timed, and located nearly 70 pieces of evidence related to the El Junquito raid, including videos, photographs, leaked audio of police radio communications and official statements, asking for more material to determine if rebel police officer Óscar Pérez and his companions were victims of extrajudicial killings.[35][36][37][38]

Yemeni Civil War

Bellingcat published that in the 2018 Hajjah Governorate airstrike the bomb was made by the American company Raytheon.[39]

In November 2018, a Bellingcat investigation on Houthi broadcasts through their affiliated Almasirah news channel of missile attacks targeted against United Arab Emirates (UAE) airports the Abu Dhabi International Airport and Dubai International Airport was published. The investigation report concluded that "It is highly likely that a Houthi-led drone attack did not take place in Abu Dhabi or Dubai".[40] According to the report, the claims of the attacks constituted a propaganda effort and followed a "propaganda pattern" claims by the Houthi leaders.[40]

Skripal poisoning

Following RT's interview with the suspects of the 4 March 2018 Sergei Skripal poisoning case, Bellingcat published the suspects' passport data showing inconsistencies in the official story, and possible links to the Russian secret service. The Russian foreign ministry rejected the report stating that it believed Bellingcat had ties to western intelligence. It noted Bellingcat's access to a not publicly available Russian database.[41][42] Two men had been seen pinpointed as likely to have carried out the attack; Bellingcat soon said it had identified one of the suspects as decorated GRU colonel Anatoliy Chepiga.[43] The other suspect was identified as GRU colonel Alexander Mishkin. In June 2019 Bellingcat reported that major-general Denis Sergeyev had travelled to London as "Sergei Fedotov", and appeared to have commanded the operation, making and receiving a great many telephone calls with a single Russian "ghost phone" without an IMEI. Bellingcat analysed position data from Sergeyev's phone to trace his movements in London, following its successfully gaining access to travel, passport, and motoring databases for the suspects.[44]

In response to Bellingcat reports on the Skripal poisoning, Russian officials claimed without evidence that Bellingcat is a front for foreign intelligence services and that Bellingcat publishes falsified information.[45] Russian media have claimed that Bellingcat is funded by the U.S. government to undermine Russia and other NATO adversaries.[46]

Christchurch mosque shootings

Following the Christchurch mosque shootings, Bellingcat published what the Columbia Journalism Review referred to as "a comprehensive and contextualized report on the motives and movements of the Christchurch killer."[47]


Bellingcat provided valuable assistance to the BBC's Africa Eye investigation of the killing of two women and their children by members of the Cameroonian Army.[1] As a result of this investigation, the US withdrew $17 million in funding for the Cameroonian Army and the European Parliament passed a resolution condemning "torture, forced disappearances, extrajudicial killings perpetrated by governmental forces."[1]


According to Muhammad Idrees Ahmad (of the University of Stirling), Bellingcat has had an influence on how legacy journalism outlets and research institutions conduct open source investigations: "Bellingcat’s successes have encouraged investment in open-source research capability by much larger and long-established media institutions (such as The New York Times Visual Investigations), human rights organizations (Amnesty’s Digital Verification Corps; Human Rights Watch’s soon-to-be-launched OSINT unit), think tanks (the Atlantic Council’s DFR Lab), and academic institutions (Berkeley’s Human Rights Investigations Lab)."[1] Mentioning "large gaps in foreign coverage" due to reduced newsroom budgets, Ahmad said that in today's digital context, newsrooms have become convinced that "sending journalists abroad is a fool’s errand."[1]

The Tow Center for Digital Journalism, Poynter Institute and scholars of journalism have recommended Bellingcat guides to journalists and journalism students on how to conduct open source investigations.[48][49][50][51][52]


In 2015, Eliot Higgins and Bellingcat received the special prize of the Hanns-Joachim-Friedrichs-Award.[53]

In 2017, Bellingcat member Christiaan Triebert won the European Press Prize Innovation Award for a detailed reconstruction of the 2016 Turkish coup d'état attempt in a Bellingcat article titled The Turkish Coup through the Eyes of its Plotters.[54]

In 2019, Bellingcat and The Insider (Russia) received the Investigative Reporting Award from the European Press Prize for identifying the two men allegedly responsible for the poisoning of Sergei and Yulia Skripal.[55]

Also in 2019, Bellingcat received a €500,000 cash prize from the Nationale Postcode Loterij of The Netherlands; it used these funds to open a new office in The Hague.[18]


In 2018 the documentary film Bellingcat: Truth in a Post-Truth World was released. The film explores Bellingcat's investigative journalism work, including the Skripal poisoning and the crash of Malaysia Airlines Flight 17.[56][57] The film won an International Emmy Award in the category Non-Scripted Entertainment in November 2019.[58][59]


  1. Muhammad Idrees Ahmad (10 June 2019). "Bellingcat and How Open Source Reinvented Investigative Journalism". New York Review of Books. Retrieved June 10, 2019.
  2. "About". Bellingcat. Retrieved August 9, 2019.
  3. "To bell the cat - definition of To bell the cat by The Free Dictionary". Retrieved 2016-12-24.
  4. "Brown Moses Blog: March 2012". Retrieved 2016-12-24.
  5. "Kickstarter-funded journalists found an ISIL training camp using Google Earth and Bing Maps". 24 August 2014. for proving Syria was using chemical weapons from his bedroom in Leicester
  6. Moses, By Brown. "Evidence From 2 Weeks Of Chlorine Barrel Bomb Attacks". brown-moses. Retrieved 2017-03-21.
  7. "Watch out for Bellingcat". Columbia Journalism Review. Retrieved 2017-03-19.
  8. "Russia's Latest Attempt to Smear Bellingcat Over MH17 – Unsuccessful". 7 August 2018. Archived from the original on 17 May 2019. Retrieved 17 May 2019.
  9. "Update in criminal investigation MH17 disaster".
  10. "Bellingcat: the home of online investigations". Kickstarter. Retrieved 2017-03-19.
  11. Batuman, Elif (23 November 2013). "Rocket Man". The New Yorker. Retrieved 24 December 2016.
  12. Beauman, Ned (August 30, 2018). "How to Conduct an Open-Source Investigation, According to the Founder of Bellingcat". The New Yorker. ISSN 0028-792X.
  13. Robin Millard (September 29, 2018). "UK site leads the way in Skripal case with online savvy". AFP. Retrieved September 30, 2018 via Yahoo! News.
  14. Eliot, Higgins. "Bellingcat: the home of online investigations". Kickstarter. Retrieved 1 October 2018.
  15. Amanpour and Company
  16. How Bellingcat outfoxes the world’s spy agencies
  17. Nederland is nu de uitvalsbasis van de Bellingcat-speurders
  18. Bellingcat to establish new office in The Hague after €500,000 funding win through Dutch postcode lottery
  19. Jasmine Andersson (2018-10-09). "What is Bellingcat – and what else had they uncovered before the Salisbury poisoning suspects?". Retrieved 2019-08-04.
  20. Sean Case; Klement Anders. "Putin's Undeclared War : Summer 2014 : Russian Artillery Strikes Against Ukraine" (PDF). Retrieved 2016-12-24.
  21. Jethro Mullen. "Report: MH17 hit by burst of 'high-energy objects'". CNN. Retrieved 2017-03-21.
  22. Maxim Tucker (2015-06-22). "Meet Eliot Higgins, Putin's MH17 Nemesis". Newsweek. Retrieved 2017-03-21.
  23. Bellingcat (November 9, 2014). "Origin of the Seperatists' Buk" (PDF). Bellingcat.
  24. "Probe: Missile that downed MH17 came from Russia-based unit". The Washington Post. 24 May 2018.
  25. Jens Kriese (June 4, 2015). "Expert Criticizes Allegations of Russian MH17 Manipulation". Der Spiegel. Retrieved June 11, 2017.
  26. "Bellingcat kontert Kritik mit neuen Satellitenbildern". Zeit Online (in German). 12 June 2015. Retrieved 11 June 2017.
  27. Toler, Aric. "British Intelligence Report Confirms Russian Military Origin of MH17 Murder Weapon". Bellingcat. Retrieved 21 December 2017.
  28. "ISCP Annual Report 2016-2017" (PDF).
  29. "Middle East unrest: Three killed at protest in Syria". BBC News. Retrieved 2017-03-21.
  30. "Syria Is Accused of Suffocating Its Citizens with Chlorine Bombs". Vice News. 23 April 2014.
  31. Komar, Rao. "The al-Tanf Bombing: How Russia Assisted ISIS by Attacking an American Backed FSA Group with Cluster Bombs". Bellingcat. Archived from the original on 2016-10-08. Retrieved 2017-03-21.
  32. Waters, Nick. "Death From Above: The Drone Bombs of the Caliphate". Bellingcat. Retrieved 2017-03-21.
  33. Al-Khatib, Hady. "Fact-Checking Russia's Claim that It Didn't Bomb a 5-Year-Old in Syria". Bellingcat. Retrieved 2017-03-21.
  34. Triebert, Christiaan. "CONFIRMED: US Responsible for 'Aleppo Mosque Bombing'". Bellingcat. Retrieved 2017-03-21.
  35. ""We are going to surrender! Stop shooting!": Reconstructing Óscar Pérez's Last Hours". Bellingcat Investigation Team. 13 May 2018. Retrieved 27 May 2018.
  36. "Was Óscar Pérez Murdered? You Could Help Us Find Out". The New York Times. 13 May 2018. Retrieved 27 May 2018.
  37. ""¡Nos vamos a entregar! ¡No sigan disparando!" RECONSTRUYENDO LAS ÚLTIMAS HORAS DE ÓSCAR PÉREZ" (in Spanish). El Pitazo. Retrieved 27 May 2018.
  38. "Investigación revela lo ocurrido durante las últimas horas de Óscar Pérez" (in Spanish). Efecto Cocuyo. 13 May 2018. Retrieved 27 May 2018.
  39. "American-Made Bomb Used in Airstrike on Yemen Wedding - bellingcat". 27 April 2018.
  40. Khalil Dewan (7 November 2018). "Investigating Houthi Claims of Drone Attacks on UAE Airports".
  41. "Skripal Poisoning Suspect's Passport Data Shows Link to Security Services - bellingcat". 14 September 2018.
  42. Roth, Andrew (15 September 2018). "Documents reveal Salisbury poisoning suspects' Russian defence ministry ties". the Guardian.
  43. Roth, Andrew; Dodd, Vikram (26 September 2018). "Salisbury poisoning suspect identified as Russian colonel". the Guardian. Retrieved 26 September 2018.
  44. Mark Urban (28 June 2019). "Skripal poisoning: Third Russian suspect 'commanded attack'". BBC News.
  45. Roth, Andrew (2018-09-27). "'We got really lucky': how novichok suspects' identities were revealed". The Guardian. ISSN 0261-3077. Retrieved 2019-08-04.
  46. "Meet The Internet Researchers Unmasking Russian Assassins". Retrieved 2019-08-04.
  47. "Terrorism bred online requires anticipatory, not reactionary coverage". Columbia Journalism Review. Retrieved 2019-08-04.
  48. "Tool for teachers: Did that really happen?". Columbia Journalism Review. Retrieved 2019-08-04.
  49. "A Guide to Open Source Intelligence (OSINT)". Columbia Journalism Review. Retrieved 2019-08-04.
  50. "Misinformation is inciting violence around the world. And tech platforms don't seem to have a plan to stop it". Poynter. 2019-04-04. Retrieved 2019-08-04.
  51. Walker, Amy Schoenfeld (2019-06-01). "Preparing Students for the Fight Against False Information With Visual Verification and Open Source Reporting". Journalism & Mass Communication Educator. 74 (2): 227–239. doi:10.1177/1077695819831098. ISSN 1077-6958.
  52. "A 5-point guide to Bellingcat's digital forensics tool list". Retrieved 2019-08-04.
  53. "Pressemitteilung 2015 - Hanns-Joachim-Friedrichs-Preis". Retrieved 2016-12-24.
  55. "Investigative Reporting Award 2019 Winner - Unmasking the Salisbury Poisoning Suspects: A Four-Part Investigation". 2019. Retrieved 2019-05-24.
  56. "Bellingcat – Truth in a Post-Truth World". IDFA. Retrieved 1 December 2019.
  57. "Bellingcat - Truth in a Post-Truth World". Human Rights Watch Film Festival. Retrieved 1 December 2019.
  58. "BELLINGCAT – TRUTH IN A POST-TRUTH WORLD WINS THE RTBF AWARD AT THE FESTIVAL DES LIBERÉTES 2019". Submarine. 31 October 2019. Retrieved 1 December 2019.
  59. "Two Dutch documentaries win International Emmy awards". 26 November 2019. Retrieved 1 December 2019.

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.