My Authors
Read all threads
Facebook just announced another takedown set:

- Russia: military intel targeting Ukraine and neighbourhood;
- Iran: 11 assets targeting US;
- Myanmar: telecoms providers targeting competitors.

@Graphika_NYC report on the Russian op to follow.

about.fb.com/news/2020/02/r…
And here's the @Graphika_NY report.

Blogs were the backbone of this operation. It also used direct messages to target individuals, and pose as citizen journalists.

Not the first time we've seen such things, but they're an under-appreciated threat.

graphika.com/reports/from-r…
The main focus of the operation was Ukraine; the main activity spanned 2016-18, though a few accounts were active until the takedown.

There were a few English-language posts on Kremlin-aligned themes. The use of language was... memorable.
The operation mainly worked in Russian and Ukrainian (bits in English, Turkish, German).

It used fake personas to create blogs on platforms including cont[.]ws and korrespondent[.]net, then posted them on Facebook and Twitter.
The content was aligned with Kremlin narratives: Russia good, Ukraine bad, White Helmets really bad, USA interfering, EU unnecessary...

Interestingly, there was quite a focus on the Crimean Tatars. And they couldn't resist a dig at @bellingcat and @EliotHiggins, too.
One of the more interesting aspects was how this operation used direct messaging to entrap targets, and probably to land its blogs in the media.

This persona posed as a journalist to ask leading questions of a Ukrainian politician and a Crimean Tatar leader.
In this one, the persona pretended to be from the Russian service of @radiosvoboda / @RFERL.

Reason to think this was done via DMs? Screenshots (caveat: such things can be photoshopped, in which case this would be disinfo rather than entrapment).
It looks like the operation also managed to plant some of its blogs as bylines in local news outlets, especially in Moldova and Ukraine.

It's a classic approach for an intelligence operation: establish a false persona, then poison the well of information.
Watch out for this approach. The Fancy Bears did it (GRU). The Iranian "Endless Mayfly" did it (h/t @citizenlab).

There's more to info ops than scattergun trolls. Some ops can be laser-focused on the individual, especially journalists and politicians.

citizenlab.ca/2019/05/burned…
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Ben Nimmo

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!