A range of behaviours here. Influence ops take many forms.
Fake a/cs posting to multiple pages to make content look popular
In-depth personas to seed geopolitical content
Large numbers of fakes to spam hashtags and geotags
GAN-generated faces, in bulk, but sloppily done.
First, the Thai Military’s Internal Security Operations Command.
About 180 assets, esp. active in 2020, posting news, current events, pro-military and pro-monarchy content, anti-separatist.
Stock profile pics, some posing as young women.
Found by internal investigation.
Iran (1): about 450 assets, mostly accounts, targeting Iraq, plus Israel, Afghanistan, the UK/Scotland.
Almost non-existent engagement, and - a nice touch - they took a day off on the anniversary of the Islamic Revolution in Iran in February 2021.
Iran (2): <30 assets posing as geopolitical analysts and news outlets, mostly created late 2020.
Posted about domestic issues (pro-gov't), supporting Iran's foreign policy, criticizing US and Saudi foreign policy. As so often with Iranian IO.
Found by internal investigation.
Morocco: about 400 assets.
Amplifying content in groups, and posting comments and pro-government, anti-opposition content.
The accounts looked bulk-created and bought. Some also posted about fashion.
Some used sloppy AI-generated profile pics, which is a tactic that keeps cropping up in influence attempts. But it can make them easier to spot by eyeball, and doesn’t change behaviour signals.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
UK telecoms regulator @Ofcom just revoked the licence of Chinese state broadcaster CGTN to broadcast in the UK, arguing the licence is held by an entity which doesn't have editorial control, in breach of UK rules.
And this, just out from @MsHannahMurphy and @SVR13: questions about the hundreds of thousands of followers that the same Huawei Western Europe execs have.
I'll leave it to others to analyse the 800k+ accounts involved in these followings, but one anecdotal sidelight on the fake network of accounts that attacked Belgium: some of its other amplification came from glambots from a network that also boosted Huawei Europe.
Glambots = automated accounts that use profile pictures taken from glamour shoots and similar sources.
One sidelight on the Russian protests today: #Navalny is probably the single most consistent target of Russian disinfo and influence operations.
He's been a target for at least 8 years, by ops including the Internet Research Agency, Secondary Infektion, and the Kremlin.
Way back in September 2013, @Soshnikoff investigated the then newly founded Internet Research Agency, and reported that it had been trolling Navalny when he ran for Mayor of Moscow.
January 2014: op Secondary Infektion set up its most prolific persona, with a pic of Navalny’s face painted blue. It started out by attacking the Russian opposition.
The username, bloger_nasralny, is a toilet pun on his name.