Join our live training


This is a live class that will take place on May 24, 2024 from 9am CET to approximately 2pm CET. You will receive further instructions on how to join the class once you have secured your seat.



Understanding Shadows

Get to know the environment used by criminals. Understand who is using Telegram for what purpose.

Searching Telegram

You will learn how to access Telegram, how to retrieve information and how to find users.

Analysis

Learn techniques and tools for analyzing individual accounts, groups, and channels.

Course Outline


  • What are the shadows?
  • Telegram & alternative social media
  • Who hides in plain sight?
  • Which threat actor activities take place on
  • Crimes that leverage Telegram
  • Case study
  • How investigators can leverage Telegram for OSINT (& use cases)
  • Understanding Telegram
  • Overview & the unique aspects of Telegram
  • Features and functionalities
  • Operational Security
  • Preparing your workspace
  • Passive monitoring
  • Searching Telegram
  • Telegram internal searches & references
  • Dorks
  • Special search engines
  • Databases
  • Sock Puppets
  • Deciding the goal of your sock puppet account
  • Operational security
  • Setting up your sock puppet
  • User Account Information
  • Finding and identifying user profiles
  • Analyzing account data
  • Expanding your research 
  • Group and Channel
  • Investigating public and private groups
  • Group dynamics & hierarchy classification
  • Monitoring groups around events of interest
  • Tools and Techniques
  • Search Techniques
  • Advanced techniques
  • Content Analysis
  • Traps & Limitations



Choose a Pricing Option