Tactical Tech
22 videos
Amateur Investigators Share Their Findings in Syria, Lebanon and Israel
Amateur investigators share their methods and experiences investigating three topics: where weapons come from in...
1 month agoHow Journalists Get Information and Investigate Cross-Border Crimes?
Romanian investigative journalist Paul Radu shares his methods for investigating corruption and organized crime, citing...
4 months agoHuman Influence on Software Algorithms
Writer, artist, and technologist James Bridle explores the possibilities and limitations of human-made algorithms and...
4 months agoWhat Stories Does Investigative Journalism Tell?
Journalist Janine Louloudi explores data-driven investigations into complex areas such as using artificial intelligence to...
5 months agoThe Syrian Archive — Web Archive Documenting Human Rights Violations in Syria
Hadi al-Khatib explains how the Syrian Archive project works and why it is needed, helping...
5 months agoDocumenting war crimes
Latvian investigative journalist Inga Springe talks about her passion and power to change the world...
3 months agoThe Syrian Archive. How Photos and Videos Help Document Human Rights Violations in Syria
Why is it important to collect video and photo evidence of human rights violations? What...
5 months agoInvisible War: How Drones Were Used in FATA (Pakistan)
Life in Pakistan's FATA (Tribal Areas) and why US drone strikes there have gone unseen....
4 months agoHow to Use Maps in Investigative Journalism?
Maps are an important tool in the hands of journalists and researchers. It is important...
5 months agoJournalism During War in Ukraine
Journalist Lyubov Rakovitsa talks about the heavy burden of reporting on the war in Ukraine....
5 months agoHow to Start Investigating Companies?
Recommendations for novice investigators on how to start investigating companies. You can learn more about...
5 months agoHow to Collect and Verify Evidence?
What information is evidence, how should it be verified. What questions should be asked when...
4 months agoWhat are the Risks for Investigative Journalists? How to Protect Yourself?
Investigative journalists often take risks and find themselves in danger. To protect yourself, you need...
2 months agoSix Easy Steps to Get Us Addicted To Our Phones
How and why we become addicted to our Phones
4 months agoWhat Someone Can Learn About Your Day by Collecting Information from Your Devices?
When you interact with devices and platforms, you give them the opportunity to collect your...
2 months agoHow to Find and Recover Deleted Web Pages?
If web pages and content are removed from the Internet, they can still be restored...
2 months agoHow Can Your Selfie be used Against You?
Who can use your selfie and how? What is verification and identification? What are the...
5 months agoWho has Access to your Personal Data?
When you allow health apps to access your personal data, do you think about what...
2 months agoWhat Can Your Phone Number Say About You?
A phone number is a fairly unique piece of information that allows you to identify...
5 months agoWhat is Digital Shadow?
What is a digital shadow, how does it appear, transform and what kind of life...
5 months agoTor Hidden Services
People need tools to ensure privacy. What are Tor Hidden Services and how can they...
2 months agoHow to Create and Use Algorithms?
Using algorithms, you can reduce the time it takes to complete many tasks. However, you...