
Educate
Access to information Safety
Verification Data Mapping Metadata Research
Exposing the Invisible - The Kit
The Kit is a collaborative, self-learning resource that makes investigative techniques and tools use...
Mapping
Maps for Advocacy: A set of Tactical Tech tools
Created by Tactical Tech in 2008 and updated in 2010, the booklet demystifies the step-by-step proce...
Dealing with Trauma
A list of helpful resources addressed to civil society members facing stress, threat and trauma in t...
School of Data: A series of tutorials on working with data
A project by the Open Knowledge Foundation teaching you all you need to know about dealing with data...
Domain Games: Role-playing an online identity
Guide featuring a step-by-step approach to setting up a new website when privacy is a significant co...
Behind the Data: Investigating metadata
A guide that looks at how metadata has been used to expose, protect and verify abuses and excesses o...
Mobile Phone Security
Resources you can use to learn about phone security.
Starting Satellite Investigations
In 2006, a group of Bahraini activists used Google Earth to view palaces and land owned by the elite...
Drone Survival Guide
A playful art project to inform citizens about the dangers and capabilities of drones worldwide.
DIY Drone Shadows
A handbook, in which author James Briddle gives guidance on how to draw a drone shadow, including ad...
ONO Robot's Guide to Staying Safe on the Internet
A Tactical Tech series of short animations featuring the character ONO, a friendly robot whose missi...
Scraping Web Data
This guide presents a series of steps that can be used to automate the collection of online HTML tab...
Smart Searching with GoogleDorking
Using search engines to their full capacity to expose the unfindable.
Metadata Research Data
Digital Resources for Citizen Investigators: Our recommendations
Many of us currently live and work in a challenging physical isolation imposed on us by the COVID-19...
Leak and Onion Soup
A guide about using Tor ("the onion router") to read, verify and process leaked data, which might co...
Decoding Data
A selections of topics, approaches and ideas for those who are thinking of getting better at working...
Verification Handbook
A guide to verifying digital content and navigating today's (dis)information environment.
Geojournalism Toolkit
The Geojournalism Toolkit was born when a group of environmental journalists felt a new approach was...
An Idiot's Guide to Money Laundering
A tongue-in-cheek "Idiot's Guide to Money Laundering" created by Global Witness, an organisation spe...
Digging into digital images: Extracting batch location data automatically
A how-to guide covering the basic steps for using open-source metadata extraction software on your d...
Verification
Who, what, why, where? Verification of online data
Misinformation can spread at a feverish pace and in this chapter we will address the essential verif...
Safety
VPN Over Tor
Using VPN over Tor for a secure anonymous connection to the internet
Me & My Shadow
A Tactical Tech website that allows you to trace your “digital shadow” - all the data you disseminat...
Who is WHOIS?
To lookup where domain names are registered you can use a database that stores the information of re...
Follow the Money: A digital guide for tracking corruption
Investigative reporter Paul Radu reveals his methods of tracking corruption and organised crime by "...
Quick Guide to Alternatives
When you use a tool, your data land ups with the company that owns that tool. The only way to really...
Unlocking Data from PDFs
A deep dive on scraping and parsing, reverse engineering a digital document to make the data in it m...
The Heretic's Guide to Global Finance
Brett Scott, publisher of Heretic's Guide to Global Finance, describes his work as a "friendly guide...
The Info-Activism How-To Guide
A comprehensive tool by Tactical Tech to teach activists the basics of evidence-based activism.
Visualising Information for Advocacy: The Book
Tactical Tech's free online book about how advocates and activists use visual elements in their camp...
Security in-a-box
Tactical Tech resources that show you how to remain anonymous online, how to protect your data and c...
FAIR Legal Guide for Investigative Journalism
Based on English law and written by British lawyer Korieh Duodu, the guide aims at helping investiga...