Part 1: Sources and Datasets
Chapter 1: TBD
Chapter 2: Protecting Sources and Yourself
Chapter 3: Acquiring Datasets
Part 2: Tools of the Trade
Chapter 4: The Command Line Interface
Chapter 5: Explore Datasets in the Terminal
Chapter 6: Docker, Aleph, and Making Datasets Searchable
Chapter 7: Reading Other People's Email
Part 3: Programming and Structured Data
Chapter 8: A Brief Introduction to Python Programming
Chapter 9: The Many CSV Files of BlueLeaks
Chapter 10: Parler, the Insurrection of January 6, and the JSON File Format
Chapter 11: BlueLeaks Explorer
Chapter 12: SQL Database and Epik Fail
Part 4: Case Studies
Chapter 13: Pandemic Profiteers Making Millions From COVID-19 Disinformation
Chapter 14: Neo-Nazis and Their Chat Rooms
Appendices
Appendix A: Using the Windows Subsystem for Linux
Appendix B: Texas GOP's Website Backup
The chapters in red are included in this Early Access PDF.