Bellingcat's Online Investigation Toolkit
  • About
  • Most Used
  • New Tools
  • ⚒️Categories
    • Maps & Satellites
      • Maps
      • Satellite Imagery
      • Street View
    • Geolocation
    • Image/Video
      • Reverse Image Search
      • Facial Recognition
      • Metadata
      • Misc
    • Social Media
      • Discord
      • Facebook
      • Instagram
      • LinkedIn
      • Reddit
      • Telegram
      • Tiktok
      • Twitter/X
      • Vkontakte
      • Youtube
      • Other Networks
      • Multiple Networks
      • International
    • People
    • Websites
    • Companies & Finance
    • Conflict
    • Transport
    • Environment & Wildlife
    • Archiving
    • Data Organization & Analysis
  • 📖Resources
    • Guides & Handbooks
    • Education
    • Newsletters & Toolkits
    • Stay Safe
  • More
    • All Tools
      • 4plebs
      • 527 Explorer
      • About Maps and Satellites
      • ACLED
      • AllTrails
      • Apollo Mapping
      • Apple Maps
      • Archive.today
      • Atlos
      • Auto Archiver
      • AutoStitch
      • Azure AI Video Indexer
      • Baidu Maps
      • Bellingcat OpenStreetMap Search
      • Bing Maps
      • Blackbird
      • Blender
      • Bluesky Insights
      • BskyFollowFinder/Bluesky network analyzer
      • BskyThreadReader
      • Bulletpicker.com
      • CAT UXO
      • China-related resources
      • Chronotrains
      • CITES Trade Database
      • Companies House
      • Convert Geographic Units
      • Datawrapper
      • DeHashed
      • DiscordLeaks
      • Distill.io
      • DomainTools Whois Lookup
      • Earth Explorer
      • Earth Online
      • EDGAR Suite
      • EDGAR
      • Equasis
      • Etherscan
      • EU consolidated corporate registers
      • ExifTool
      • F4Map
      • FaceCheck.ID
      • FlightAware
      • Flightradar24
      • Forensically
      • GeoHints
      • Gephi
      • Ghunt
      • Global Fishing Watch Map
      • Global Forest Watch
      • Global Monitoring System - ECOSOLVE
      • Global Suppliers Online
      • Google Earth Engine
      • Google Earth Pro
      • Google Flood Hub
      • Google Lens
      • Google Maps
      • GovMap
      • GPSJam
      • Have I Been Pwned
      • Hitta.se
      • Hoaxy
      • Hugin
      • Hunchly
      • ICANN Lookup
      • ICIJ Offshore Leaks Database
      • ImportGenius
      • ImportYeti
      • Index Database
      • Instagram Location Search
      • Instant Data Scraper
      • Intelx.io
      • InVID
      • KartaView
      • Leak-Lookup
      • License Plate Maps
      • LittleSis
      • Liveuamap
      • Logseq
      • Lumen
      • Maigret
      • Maltego Graph
      • MapChecking
      • Mapillary
      • MapSwitcher
      • MarineTraffic
      • Meta Content Library
      • MW Geofind
      • Name Variant Search
      • Namechk
      • NASA Firms
      • NASA Worldview
      • NeutrOSINT
      • North Data
      • Obsidian
      • OCCRP Aleph
      • Open Measures
      • Open Ownership
      • Open Source Munitions Portal
      • OpenCorporates
      • OpenSanctions
      • OpenSecrets
      • OrbTrack
      • Osint Tools Map
      • Overpass Turbo
      • PeakVisor
      • Picuki
      • PimEyes
      • Pinpoint
      • PixPlot
      • Planet Labs
      • QGIS
      • Quick geolocation search
      • Radar Interference Tracker
      • RAWGraphs
      • RootAbout
      • RuPEP
      • SanctionsExplorer
      • satellites.pro
      • Search by Image
      • Sentinel Hub Playground
      • ShadeMap
      • Shadow Finder
      • ShadowMap
      • Sherlock
      • Skopenow
      • SkyFi
      • Snap Map
      • Strava
      • Suncalc
      • Telegago
      • Telegram Group Joiner
      • Telegram Phone Number Checker
      • TelegramDB
      • Telemetrio
      • Telemetry
      • Telepathy
      • Tencent Maps
      • TGStat
      • The Information Laundromat
      • TinEye
      • TrueCaller
      • TruffleHog
      • Twitter Advanced Search
      • Twitter Location Search
      • Twitter Video Downloader
      • Umbra Space
      • UN Comtrade Database
      • UNOSAT Analyses
      • Uwazi
      • VesselFinder
      • Wayback Machine
      • Web Archives
      • What CMS
      • WhatsMyName
      • Who posted what?
      • Whoxy
      • Wikimapia
      • Wikipedia list of registers
      • WildEye
      • Wildlife Trade Portal
      • xIFr
      • Yandex Maps
      • Zotero
Powered by GitBook
On this page
  • URL
  • Description
  • How to search and filter data
  • How to perform an advanced search
  • How to search within datasets
  • Cost
  • Level of difficulty
  • Requirements
  • Limitations
  • Ethical Considerations
  • Guides and articles
  • Tool provider
  • Advertising Trackers

Was this helpful?

Edit on GitHub
Export as PDF
  1. More
  2. All Tools

OCCRP Aleph

Aleph offers a way to research sanctions lists, corporate registries, leaks, and more

Last updated 21 days ago

Was this helpful?

URL

Description

Aleph is a platform by the Organized Crime and Corruption Reporting Project (OCCRP) to help journalists and investigators "follow the money". It provides access to many datasets on people and companies, and offers tools to organize and visualize data. Investigators can use Aleph to search sanctions lists, corporate registries, leaks, and more. They can also create workspaces to collaborate and upload their own data to cross-reference with Aleph's datasets.

How to search and filter data

Type the name of an individual, an organization, a company or a keyword in the search bar. The results will display the total number of mentions of your search term and the yellow highlights will show the context in which the search term appears.

To narrow down the search results, use the menu on the left to filter by date, country, language of the document, and .

To view a particular entry, click on the hyperlink you are interested in. This opens a pop-up in the same window. From here you can review the document online or download it.

How to perform an advanced search

In addition to basic keyword searches, Aleph offers advanced search capabilities, enabling users to find matches based on spelling variations, term proximity, and other sophisticated criteria.

The advanced search options can be helpful in cases when there are too many results and you need to narrow down your search further. You can use the fields in the advanced search, or you can use search operators.

Some examples of search operators that can be used instead of the advanced search form above:

"" Quotations - putting a phrase within quotations will prompt the search to find the exact match of that phrase, for example "money laundering" will return results for this same search term.

~ Proximity variant 1 - this is useful when you need to search for slight variations in a search term, for example launder~3 will search for launder, but also matches that that include up to 3-letter variations of "launder" - laundered, laundering, launders. These variations include adding, removing, and changing a letter.

~ Proximity variant 2 - used to find words in proximity to each other and is helpful when you need higher relevance for the results, for example "fraud minister"~5 will search these two words within a given distance from each other. In this case it will search for matches where fraud and minister are five or fewer words apart from each other.

+/- Inclusion/exclusion of keywords - finds matches that contain one search term but exclude another, for example +Moscow -Medvedev will search documents that contain the word Moscow, but will exclude that contain Medvedev. Please be aware that in this case it will also exclude documents that contain BOTH Moscow and Medvedev.

AND operator - searches matches in which each result must contain both the keywords, but won't return matches that only contain just one of those keywords, for example Russia AND Medvedev.

OR operator - searches all matches that contain one or the other search keyword, or both, for example Russia OR Medvedev.

Searches can be as intricate as you want them to be, for example +Medved~2 AND (Moscow OR Kremlin OR Krasnodar) -Putin. Additionally, these searches work in Cyrillic.

How to search within datasets

At the top of the Aleph page there is a menu called Datasets which opens a search for each dataset in the OCCRP databank. You can use the search bar to find a specific dataset and browse its contents.

Use the Source Documents menu to review each uploaded file in this dataset. The documents are all available for download. Additionally, you can chose the Cross-reference menu to check for different spellings of names, or variations in the names. The cross-reference results are also available for download and can help clear out uncertainties in your research.

Cost

Level of difficulty

Aleph provides a range of tools and mechanisms to aid investigations. They are simple to use, but familiarizing yourself with the different tools and their functions may take some time.

Requirements

No account is necessary to browse Aleph data. However, if you need an export of the results from a search, you need to create a free account. This requires the submission of evidence of relevant previous work (reports, articles, etc.), the name of the organization you are affiliated with and your role there. The same goes for creating research project spaces.

Limitations

The OCCRP has restricted access to certain datasets. Access to protected materials can be granted to investigative journalists, activists, or researchers.

Leaked datasets by nature are not always complete, and are thus imperfect sources.

Some data types are not compatible with Aleph.

Ethical Considerations

While leaked datasets can provide valuable insights and foster transparency, they often involve sensitive and personal information obtained without consent. Thus, making use of these datasets can harm individuals whose data has been exposed. It is therefore imperative to weigh the public interest against privacy violations and ensure data is handled responsibly, with respect for legal and ethical standards.

Guides and articles

Tool provider

Advertising Trackers

Page maintainer

LPetrova

The OCCRP Aleph website has a handy on how to search and filter data as well as written detailed instructions on .

OCCRP Aleph does provide a step-by-step tutorial on advanced searches .

If you have created an account for Aleph, you can also make use of their Investigation workspaces. Here is a on how to create and handle a workspace.

You can find the and which ones have an feature.

Some datasets are only accessible to approved users. To be approved, you must fill out .

Aleph's for developers, including an architecture overview, API usage, ingest pipelines, named entity and pattern extraction, development and operations guides.

OCCRP:

Humber College's StoryLab:

Associação Brasileira de Jornalismo Investigativo: (video in Portuguese)

The

video tutorial
search basics
here
detailed guide
languages supported on Aleph here
OCR
this form
Aleph User Guide
technical documentation
How to Search, Use Filters, and Set Alerts
Using OCCRP’s Aleph for Dark Web Data Analysis
Learn how to use Aleph in your journalistic investigations
Organized Crime and Corruption Reporting Project (OCCRP)
https://aleph.occrp.org/
A detailed introduction to Aleph
The search term Dmitry Medvedev returns over 4,000 results.
Example of all the available filters.
View of a selected document from the results page
Advanced search options on the Aleph website
The top right menu Datasets takes you to the search bar. Use keywords to find datasets you are interested in.
View of a specific dataset. Each of the names, emails, and entity types above is hyperlinked and opens a new page for the selected item.
Example of the Source documents view
Example of the Cross-reference view