Our Investigation Process

Every investigation follows a rigorous methodology designed to ensure accuracy, fairness, and impact. From initial tip to published report, we verify every claim through multiple independent sources.

01

Data Collection

Gathering information from public records, FOI requests, and confidential sources

02

Verification

Cross-referencing data and validating claims through multiple sources

03

Analysis

Identifying patterns, connecting networks, and quantifying impact

04

Right to Reply

Providing those accused with opportunity to respond before publication

05

Publication

Making findings accessible to journalists, citizens, and oversight bodies

Detailed Methodology

Phase 1

Data Collection & Intelligence Gathering

We cast a wide net to gather information from diverse sources, ensuring we have a comprehensive picture before drawing conclusions.

📄

Public Records

  • Government procurement databases
  • Budget documents and expenditure reports
  • Corporate registries and financial filings
  • Court records and legal proceedings
  • Parliamentary committee reports
🔓

Freedom of Information

  • Formal FOI requests to government agencies
  • Contract documents and payment records
  • Internal communications and memos
  • Audit reports and compliance reviews
  • Project evaluation documents
🤝

Human Sources

  • Whistleblowers and insiders
  • Industry experts and consultants
  • Former employees of relevant entities
  • Community members affected by corruption
  • Journalists and civil society partners
📰

Media & Reports

  • Previous investigative reporting
  • NGO and watchdog reports
  • International organization assessments
  • Academic research and papers
  • News archives and historical coverage
Phase 2

Verification & Cross-Referencing

We verify every claim through multiple independent sources. A single source is never sufficient for publication.

Required

Multiple Source Verification

Every factual claim must be confirmed by at least two independent sources, preferably from different categories (e.g., documents + human source).

Required

Document Authentication

Documents are checked for authenticity through metadata analysis, cross-referencing with official databases, and expert review when necessary.

Required

Data Integrity Checks

Numerical data is verified against official sources, statistical anomalies are investigated, and calculations are independently validated.

Best Practice

Expert Consultation

Complex technical matters are reviewed by subject matter experts—accountants, engineers, lawyers—to ensure accurate interpretation.

Phase 3

Analysis & Pattern Recognition

Raw data becomes evidence through systematic analysis that reveals patterns, connections, and the scale of corruption.

Financial Analysis

We follow the money through:

  • Payment flow mapping
  • Shell company network analysis
  • Beneficial ownership tracing
  • Price comparison and markup analysis
  • Budget vs. expenditure reconciliation

Network Mapping

We identify connections between:

  • Companies and their owners
  • Political figures and contractors
  • Related procurement irregularities
  • Geographic patterns of corruption
  • Timing of contracts and political events

Statistical Analysis

We use data to reveal:

  • Outliers in pricing or payments
  • Abnormal patterns in contract awards
  • Comparison with industry benchmarks
  • Trends over time and across regions
  • Correlation between variables

Impact Assessment

We quantify the consequences:

  • Financial loss to public funds
  • Project delays and their costs
  • Services not delivered to citizens
  • Long-term economic impact
  • Social and human costs
Phase 4

Right to Reply & Fairness

Before publication, we contact all individuals and organizations featured in our investigations, providing them an opportunity to respond to specific allegations.

1. Detailed Notification

We send written notification outlining the specific allegations and evidence we plan to publish. This includes sufficient detail for the subject to understand and respond to the claims.

2. Reasonable Timeframe

We provide at least 7 business days for response, longer for complex cases. We accommodate reasonable requests for extensions when circumstances warrant.

3. Fair Representation

Responses are included in our published reports, presented fairly and accurately. We do not cherry-pick or misrepresent responses, even when they contradict our findings.

4. Additional Review

If responses include new evidence or claims, we investigate those claims before publication. We correct our work if the response reveals errors.

Phase 5

Publication & Dissemination

Our goal is maximum appropriate impact. We publish findings in accessible formats and work with partners to ensure investigations reach the right audiences.

Public Platform

Searchable database of cases, documents, and data available at platform.corrupty.com

Investigative Reports

Long-form articles on corrupty.com/blog with full context, evidence, and analysis

Media Partnerships

Collaborations with journalists and news organizations for broader reach

Civil Society Briefings

Direct sharing with NGOs and advocacy groups who can drive accountability

Oversight Bodies

Formal notifications to audit offices, anti-corruption agencies, and parliamentary committees

Our Data Sources

We rely on authoritative, verifiable sources for all investigations

Government Sources

  • National procurement portals
  • Treasury expenditure reports
  • Parliamentary budget offices
  • Audit general reports
  • Ministerial records and statements
  • Public service commission data

Corporate & Legal

  • Corporate registry databases
  • Beneficial ownership registries
  • Court filings and judgments
  • Contract registries
  • Financial disclosures
  • Land and property records

International Organizations

  • World Bank project databases
  • IMF country reports
  • UN development program data
  • Transparency International indices
  • Regional development banks
  • OECD anti-bribery reports

Specialized Databases

  • Offshore leaks databases (ICIJ)
  • OpenCorporates
  • Investigative Dashboard
  • Global Witness data
  • OCCRP Aleph
  • Follow the Money platforms

Tools & Technology

Modern investigations require modern tools

📊

Data Analysis

Python, R, SQL for analyzing large datasets, identifying anomalies, and modeling relationships

🗺️

Visualization

Network mapping tools, geographic information systems, and interactive charts to make data understandable

🔒

Secure Communications

Encrypted messaging, secure file transfer, and anonymous tip systems to protect sources

🔍

Document Analysis

OCR for scanning documents, metadata extraction, and automated redaction for sensitive information

Quality Assurance & Editorial Review

Every investigation undergoes multiple layers of review before publication to ensure accuracy, fairness, and legal compliance.

1

Peer Review

Another investigator reviews the evidence, methodology, and conclusions independently

2

Editorial Review

Senior editors assess clarity, fairness, and newsworthiness

3

Legal Review

Attorney evaluates defamation risk and ensures compliance with journalism law

4

Fact-Checking

Dedicated fact-checker verifies all claims, sources, and citations

Have information about corruption?

We protect sources and investigate credible tips. Your information could expose wrongdoing and drive accountability.