Join our live training
This is a live class that will take place on January, 28 2025 from 8pm CET. You will receive further instructions on how to join the class once you have secured your seat.
Understanding Shadows
Get to know the environment used by criminals. Understand who is using Telegram for what purpose.
Searching Telegram
You will learn how to access Telegram, how to retrieve information and how to find users.
Analysis
Learn techniques and tools for analyzing individual accounts, groups, and channels.
Course Outline
- What are the shadows?
- Telegram & alternative social media
- Who hides in plain sight?
- Which threat actor activities take place on
- Crimes that leverage Telegram
- Case study
- How investigators can leverage Telegram for OSINT (& use cases)
- Understanding Telegram
- Overview & the unique aspects of Telegram
- Features and functionalities
- Operational Security
- Preparing your workspace
- Passive monitoring
- Searching Telegram
- Telegram internal searches & references
- Dorks
- Special search engines
- Databases
- Sock Puppets
- Deciding the goal of your sock puppet account
- Operational security
- Setting up your sock puppet
- User Account Information
- Finding and identifying user profiles
- Analyzing account data
- Expanding your research
- Group and Channel
- Investigating public and private groups
- Group dynamics & hierarchy classification
- Monitoring groups around events of interest
- Tools and Techniques
- Search Techniques
- Advanced techniques
- Content Analysis
- Traps & Limitations
Check your inbox to confirm your subscription