The Islamic State’s Own Photos Were Just Used to Find One of Its Training Camps

A landmark in a photo taken by the Islamic State is shown using Bellingcat's crowd-sourced software.

Screenshot via Bellingcat

AA Font size + Print

A landmark in a photo taken by the Islamic State is shown using Bellingcat's crowd-sourced software.

A British journalist teamed up with analysts and reporters to determine exactly where Islamic State fighters train near the Tigris River in Mosul, Iraq. By Kabir Chibber

A group of crowd-funded citizen journalists seem to have located a training camp for the militant group ISIL using only online mapping services and some old-fashioned detective work. Bellingcat, which raised almost £51,000 ($85,000) to do its own unique form of journalism, was founded by Eliot Higgins, who became famous (and was profiled by the New Yorker) for proving Syria was using chemical weapons from his bedroom in Leicester, England using only images and videos available online. His team includes a mix of bloggers, research analysts, and traditional reporters.

Bellingcat has explained in detail how it found the exact location of a training camp. First, using stills from videos showing the graduation of an ISIL class earlier this year, the team identified a large river and several bridges in the background, which it identified as the Tigris in Mosul, Iraq, the city that ISIL took in June and have been wreaking havoc in since. The group used Google Earth to make the identification.

To identify exactly which building, Bellingcat used Flash Earth, a more up-to-date service that uses Microsoft’s Bing Maps to see where along the river the building is.

“In the entire area there’s only one possible location that matches, on the north side of the river, with the camera pointing south,” the team said. “It also appears the martial arts lessons were photographed in the same area, with the bridge running over the road visible, and the trees on the right.”

The team also used Panoramio, a service that takes the location metadata on photographs and puts them on a Google Map. Using a single photo, Bellingcat noticed that the Arabic writing on a bridge in the corner of the picture, as well as the placement of the street lights.

It also used old photos on Google Maps against the Panoramio pictures to determine that the buildings the jihadists are marching in front of are new, and that they must have marched 2.9 km (1.8 miles).

The whole process to pinpoint the training camp is impressive—and what is more impressive is that you can do it too. Bellingcat has a series of guides on how to geolocate photos and images. As Higgins explains his mission on Kickstarter:

The practice of journalism  is continuing to expand and broaden. We don’t need to exclusively rely on traditional news media to do the digging and reporting for us. We—you—can do it on our own.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.