OSINT for Journalists: Verifying Sources and Claims

How working journalists use OSINT to verify sources, authenticate images, trace corporate connections, and survive fact-checking. A practitioner's guide.

Journalism has always relied on open sources; what changed in the last fifteen years is the depth and structure of what is publicly queryable. A reporter working a tip in 2026 has access to tools that would have required a full-time researcher in 2010. This post covers the OSINT techniques that earn their keep on deadline. For the full domain guide, see /domains/journalism/.

Source Verification

A source calling themselves a "former DOJ prosecutor" is a claim, not a fact. Verify before quoting.

Checks, in order:

  1. Bar admission records. Most US state bars publish searchable directories with admission date, status, and disciplinary history.
  2. PACER for appearances. If the source claims trial experience, their name should appear as counsel of record.
  3. Published writing. Former DOJ staff often have academic or policy publications. Google Scholar and SSRN index these.
  4. LinkedIn and archived versions. Use the Wayback Machine to check whether their bio changed recently — a sudden addition of credentials is a warning sign.
  5. Press archives. Nexis, ProQuest, or even a targeted Google dork:
site:justice.gov "John A. Smith" OR "J. Smith"
"former federal prosecutor" "John Smith" -site:linkedin.com

If all five line up, the claim is credible. If the source resists any of these verifications, that itself is a finding.

Image and Video Authentication

Bellingcat's public work has made geolocation and chronolocation well-documented. The short version:

  1. Reverse image search first. Run through Yandex, Google Lens, and TinEye. If the image predates the claimed event, the claim is wrong. See /tools/reverse-image/.
  2. Extract metadata. EXIF survives direct-from-camera uploads but is stripped by most social platforms. Use /tools/metadata/ techniques on original files.
  3. Geolocate from landscape features. Shadows give time of day; building details give location; vegetation narrows the hemisphere. Compare against Google Earth Pro historical imagery.
  4. Chronolocate from sun position. SunCalc and similar tools map the shadow angle to a date range.
  5. Cross-reference with contemporaneous reporting. A video claiming to show an event on date X should match weather, crowd density, and other reports from that date.

Published examples — see the Epstein Revealed investigation series — lean on the same techniques with document scans instead of field video.

Corporate and Financial Checks

For any named company or LLC, minimum due diligence:

  • Search OpenCorporates and the relevant state registry.
  • Pull SEC EDGAR full-text for any filings mentioning the entity.
  • Run court records — PACER for federal, state-level docket systems (many states now have free public dockets).
  • WHOIS the company's domain and archive the site. See /tools/whois/.

A useful Google dork for SEC coverage:

site:sec.gov filetype:htm "Meridian Holdings" OR "Meridian Capital"

For financial-specific techniques, see /domains/financial/.

Social Media Verification

Social media OSINT is overrepresented in OSINT coverage and underperforms most other sources. That said, it is indispensable for:

  • Establishing a person's public statements over time
  • Corroborating presence at events
  • Network mapping (who follows/interacts with whom)

Techniques, with ethical caveats in /tools/social-media/:

  • Account creation date (via third-party lookup services for platforms that expose it)
  • Archive-based profile history via the Wayback Machine
  • Public follower/following lists for network analysis
  • Geotag analysis where still available

Do not rely on a single post for anything important. Platforms revise, delete, and back-date content.

Document Forensics

Journalists handle leaked or FOIA-released documents constantly. Before publishing any claim based on a document:

  1. Confirm provenance. Who gave it to you, who gave it to them, and how far back can you trace it?
  2. Check metadata. PDFs carry creation, modification, and sometimes author/revision data. See /tools/metadata/.
  3. Cross-check against known-genuine examples. Fonts, header structure, and signature blocks should match legitimate templates.
  4. Run OCR and full-text search against known databases to see if the document has surfaced elsewhere.

For large document sets — leaks, FOIA dumps, or discovery productions — structured review tools matter. Newsrooms with budget use DocumentCloud, Veritone, or the Subthesis legal document analysis tool for consistent triage.

The FOIA Pipeline

Public records requests are slow but produce material nothing else can. See /tools/foia/ for the full process. A serviceable FOIA template:

To: [Agency] FOIA Officer
Re: Freedom of Information Act Request

Under the Freedom of Information Act, 5 U.S.C. § 552, I request copies of the
following records:

1. All communications between [named official] and [named outside party] between
   [date] and [date] containing the terms "[term 1]", "[term 2]", or "[term 3]".
2. All calendar entries for [named official] between [date] and [date] referencing
   meetings with [named outside party or entity].

I request a fee waiver on the grounds that disclosure is in the public interest
because it is likely to contribute significantly to public understanding of
government operations or activities and is not primarily in my commercial
interest. I am a journalist affiliated with [outlet].

Please provide records in their original electronic format where available.

Sincerely,
[Name, outlet, contact]

The specifics — date ranges, search terms, named parties — determine whether you get documents or a rejection. Vague requests produce vague denials.

Fact-Checking Workflow

Before a story runs, every factual claim should be tied to a source in a fact-check matrix:

Claim Source Archive URL Hash Notes
X was registered on 2023-06-14 OpenCorporates web.archive.org/... 9f4e... officer list at p.1

This is the reporting-phase discipline carried through publication. It is what keeps a story standing when the subject's lawyers write.

Ethics Specific to Journalism

  • Source protection trumps source verification. Verify using sources the source did not give you.
  • Minors and non-public figures get stronger protection. Public conduct of public figures is fair game; private lives of private people usually are not.
  • Right of reply. Contact subjects before publication with specific claims and a meaningful deadline. It is both ethical and legally protective.

See /ethics/ for the full framework.

Where to Start

If you are a journalist new to OSINT:

  1. Read /methodology/ end to end.
  2. Work through /tools/wayback-machine/, /tools/whois/, /tools/reverse-image/, and /tools/foia/.
  3. Pick a published investigation — the Epstein Revealed investigation series is a reasonable starting point — and try to reproduce one finding from the public record.

The third step is the one that turns reading into capability.

More from the blog