We are reworking how we're processing donations to maximize the $ that Meduza receives. Instead of directly signing up to this webinar via our payment platform, please send a 200 EUR or USD donation to Meduza directly. Forward us the receipt and we'll send you webinar info!
Please see more information on the webinar (time, topics, etc.) and direct instructions on this receipt-forwarding thing here: events.eventzilla.net/e/bellingcat-o…
We're refunding the payments for the 14 (!) people who have registered, so that they can directly donate the money to Meduza. They'll get the most money out of it as possible, without worrying about extra VAT/service fees. If you already signed up, we sent you an email just now.
So far, we have 3500 EUR raised (assuming everyone redirects their payments that we're refunding back to a Meduza donation). Hopefully we can hit 5000!
Support Meduza here, and make sure you note the monthly / one-time option: support.meduza.io/en
• • •
Missing some Tweet in this thread? You can try to
force a refresh
We've put all information about our Digital Showcase Series on one page! You can register for upcoming free events (one on Ukrainian corruption, and one on investigating the Darknet and Telegram) there, and watch recordings of our previous showcases. bellingcat.com/resources/2021…
Our next digital showcase will be on May 7, 3pm Kyiv time, featuring Anna Kalyuzhna from @bihusinfo, in Ukrainian. She will detail digital investigative methods in uncovering financial corruption. Check the page below to bookmark the Zoom webinar link. bellingcat.com/resources/2021…
On Saturday (May 8) at 4pm Moscow/2pm London, @Soshnikoff will show how to use the darkweb and Telegram for journalistic investigations. The session will be led in Russian.
Find the Zoom webinar link below, and bookmark it for next weekend: bellingcat.com/resources/2021…
@Mabl2K In 2015, the #FBI released images of John Doe 29. This individual is NOT accused of committing any abuse but may have critical information pertaining to the identity of a child victim in an ongoing sexual exploitation investigation
The latest from Respekt, @the_ins_ru and Bellingcat, revealing more details into the GRU's operations in Europe, evidencing how there were linked to the conflict in Ukraine bellingcat.com/news/uk-and-eu…
We previously identified more team members of the GRU team responsible for the Vrbetice warehouse explosion in Czechia, and that it included the most senior leadership of the unit. bellingcat.com/news/2021/04/2…
Two open questions remain the subject of speculation by the press: First, whether the sabotage operation in Czechia in 2014 is linked to the poisoning of the arms manufacturer Emilian Gebrev in 2015 bellingcat.com/news/uk-and-eu…
A (re)discovered series of posts seemingly authored by Q shed a little more light on the figure behind the notorious conspiracy. Largely unnoticed, they have not entered "official" aggregators of "Q drops" - as true believers call Q's prophecies.
How do we know they share the same author as Q's "canonical" posts? These "lost drops" include large sections of text which are identical to both previous and subsequent Q drops, in several cases sharing a unique user ID with the latter.
Compare Lost drop A (left) with canonical drop 4 (right). These apocryphal "Q drops" were made shortly after the first verified Q drop, on October 28, 2017. The conspiracy was in its infancy - what would an impostor have to gain?
Thanks to everyone who attended today's digital showcase from @zkharazian, who discussed how to track disinformation in an Armenian context.
You can watch a recording of the event here (~2.5 hours):
You can watch this Monday's digital showcase event, ran by @RuslanLeviev, here (Russian):
Our next digital showcase event will be @Soshnikoff on May 6th, with a presentation led in Russian on an investigation he conducted, and then on May 7, a presentation in Ukrainian from a journalist at @bihusinfo focusing on anti-corruption investigations using OSINT techniques.