What seems to be Russian trolls fabricated false media websites and even videos. We worked with two sites that emulate Sueddeutsche Zeitung.
#osint 🧵 how the actors went about...
First, I have to give it to the trolls, the site looks stunningly similar to the real thing. Logos, webicons, the js., the CSS, the links to the real site, all neatly in place.
1)
A search for the domain, in this case ...eutsche.me or ..eutsche.online will link back to the real main page.
The top level domains are cheap GoDaddy domains, proxied via the US company #Cloudfare, to disguise the identity of the trolls... sneaky 👟
2)
Cloudfare is the company that maintained a contract with the people behind the imageboard 8chan (until they finally cut biz ties) where a manifesto was published before trror events and which is linked to massshootings in the US & the CC shootings in New Zealand
The biggy is probably instances of trackers. Those will redirect the user and monitor traffic and clicks. Its a consistent element in, what seems a more sophisticated troll disinformation campaign. The trackers connect for isntance to Russian service #Yandex (🦸‍♂️ @SedimentIV)
3)
As @LarsWienand & others reported, there are a variety of media sites imitated by domains that were faked. For SZ it was .me and .online. Other cheap top level domains incl .today .live ... some hosted on namecheap. A Pattern
Great story by Lars here: t-online.de/nachrichten/de…
5) How to spot the fake sites: Mainly via search engine and other #Google search operators. Non media domain related websites can be found by excluding domains or parts of them: "-site:suedd..." "-site:.de"
6). Finally to the imitated videos: The videopieces suggest they where produced with automation. The video snippets used are exactly 5 seconds long. The material make NO sense, suggesting their footage where scrape off a streaming platform & automatically added together....
The faked videos are about dissatisfaction with the government, since the russian invasion/agression war. But reverse image search of the video snippets show clearly instances months before the event.

Vid scene of politician Schäuble was from Oct 2021
7)
A scene of a demonstrator verbally attacking another minister was from January, 2022. The profiles who reposted the fake media links where cheap sock puppet or bots with easily IDable #ThisPersonDoesNotExist headshots... its is a poor attempt to spread it, with limited success
8)
Conclusion: The faking of media sites were somewhat well done. It was down to how easy the website infrastructure made it for the trolls. The video is a bad attempt to woo the crowds. All in all, it didnt convince. You can read the story here: sueddeutsche.de/politik/desinf…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Techjournalisto

Techjournalisto Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Techjournalisto

Mar 12
#Satellite investigations around #Ukraine crisis has many facets, opportunities & problems.
Short thread on potential for more research & findings
#OSINT, #Intelligence, #Ukraine️
#Journalism
1) Most obvious: Showing the sheer extent of destruction from high-res satellite images. Like here (my video eval video) on a destroyed warehouse in Stoyanka, Kyiv region. Maxar, March 10.
2) Satellite images can also help to dismiss #disinformation. Fake posts claimed that the warehouse in Stoyanka exploded/burned up in 2015. That's impossible. We see it untouched on dated images inf 2019 & April 2020 on Google Earth
Good tool: livingatlas.arcgis.com/wayback
Read 21 tweets
Feb 24
#OSINT protips: Incredibly useful at this stage for journalists assessing the situation in UKR: Street Cameras... Thread Image
Today showed unmistakably what livestreaming street cameras can offer for open source investigators/Journalists. How to find them?
Search on Youtube for live camera on the filter, for "Камера"... Image
There are various YouTube accounts that r immediately of great value, some started streaming recently, offering #OSINT intel to investigators... Wont call them out because I dont want them to close down. But especially in ODESSA there is one of GREAT value. Hope more open up Image
Read 6 tweets
Feb 23
The Russian-triggered Ukraine border tension involves increasingly incidents around critical infrastructures, especially around #pipelines
A short #OSINT thread on working with data on pipelines and tools that help in the process
(1)
Yesterday, a UKR armed forces officer posts a video of a burning electricity plant. Filmed @ Luhansʹka Power Station in Schastia, as @bibken geolocated, we find the name of the assoc. city mentioned. Then google dork the plant. Rest is SOP #GEOSINT (2)
Another example: few days earlier showed the value of ready-at-hand geo-information on pipeline infrastructure:
Media name-drops pipeline involved in a blast, in UKR. Problem: Druzhba gas pipeline isnt involved in breakaway Luhansk. Easy factcheck with interactive maps here (3)
Read 9 tweets
Feb 23
On July 15, 2021, one girl, three boys, a doctor, an engineer, and a bunch of other civilians get killed in an Afghan airstrike. The reconnaissance plane coordinating bombing w. AAF fighter jets spotted & IDed as a Pilatus PC-12
Our #swissarms story out, a quick #OSINT thread
Video analysis shows a range of bombing videos tweeted by @ro_modafghan. Crosshair & other details such as the flying speed, verified via MGRS calculator (legallandconverter.com/p50.html) corroborate type of reconnaissance plane used.
Pic: MOD boasting w PC12 plane (2)
Mainly Google/Twitter/FB dorks w. Persian translation helped the team. It verified early images of a missing plane, when a Taliban Badri 313 "Special Forces" soldier is IDed on other footage (3)
Helpful dorking cheatsheet here: gbhackers.com/latest-google-…
Read 9 tweets
Feb 17
Investigating crypto scams? Here is some of my go-to #OSINT toolbox for journalists (Thread) Image
First: I check Etherscan to get a feel for transactions, their volume & frequency of trading.
Discrepancies may occur if coins receive few big amounts & lots of small ones. The big hitters could be a sign of something odd at play. CSV export posbl
etherscan.io/address/your-a… ImageImage
Second: If you investigate new coins, they usually issue whitepapers. It typically explains how capital is raised, in what stages, and also should: what anti-money laundering checks are in place. Does the founder let investments run via their private account?...
Read 8 tweets
Feb 10
Quick #OSINT Thread: how to determine the exact location of a photographer, time, date... from an image and a few other details. A few months back I ran some training on the matter... Where is this? (1)
(2) Reverse image search of the little red sign, reveals its owner, the SBB, Swiss rail service. Check IP address via IP Lookup, which narrows it down to Zürich City... (use a web scraper to create a polygon area for location estimates) iplocation.net
#OSINT
(3) By now, it should have dawned on you, which Hotel building the shadow throws onto a train station and the name of a new popuphotel. Dare a guess for the wifi name, via Wigle shows you access points... another way of confirming the location...
#OSINT
wigle.net
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(