What seems to be Russian trolls fabricated false media websites and even videos. We worked with two sites that emulate Sueddeutsche Zeitung. #osint 🧵 how the actors went about...
First, I have to give it to the trolls, the site looks stunningly similar to the real thing. Logos, webicons, the js., the CSS, the links to the real site, all neatly in place. 1)
A search for the domain, in this case ...eutsche.me or ..eutsche.online will link back to the real main page.
The top level domains are cheap GoDaddy domains, proxied via the US company #Cloudfare, to disguise the identity of the trolls... sneaky 👟
2)
Cloudfare is the company that maintained a contract with the people behind the imageboard 8chan (until they finally cut biz ties) where a manifesto was published before trror events and which is linked to massshootings in the US & the CC shootings in New Zealand
The biggy is probably instances of trackers. Those will redirect the user and monitor traffic and clicks. Its a consistent element in, what seems a more sophisticated troll disinformation campaign. The trackers connect for isntance to Russian service #Yandex (🦸♂️ @SedimentIV) 3)
As @LarsWienand & others reported, there are a variety of media sites imitated by domains that were faked. For SZ it was .me and .online. Other cheap top level domains incl .today .live ... some hosted on namecheap. A Pattern
Great story by Lars here: t-online.de/nachrichten/de…
5) How to spot the fake sites: Mainly via search engine and other #Google search operators. Non media domain related websites can be found by excluding domains or parts of them: "-site:suedd..." "-site:.de"
6). Finally to the imitated videos: The videopieces suggest they where produced with automation. The video snippets used are exactly 5 seconds long. The material make NO sense, suggesting their footage where scrape off a streaming platform & automatically added together....
The faked videos are about dissatisfaction with the government, since the russian invasion/agression war. But reverse image search of the video snippets show clearly instances months before the event.
Vid scene of politician Schäuble was from Oct 2021 7)
A scene of a demonstrator verbally attacking another minister was from January, 2022. The profiles who reposted the fake media links where cheap sock puppet or bots with easily IDable #ThisPersonDoesNotExist headshots... its is a poor attempt to spread it, with limited success 8)
Conclusion: The faking of media sites were somewhat well done. It was down to how easy the website infrastructure made it for the trolls. The video is a bad attempt to woo the crowds. All in all, it didnt convince. You can read the story here: sueddeutsche.de/politik/desinf…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1) Most obvious: Showing the sheer extent of destruction from high-res satellite images. Like here (my video eval video) on a destroyed warehouse in Stoyanka, Kyiv region. Maxar, March 10.
2) Satellite images can also help to dismiss #disinformation. Fake posts claimed that the warehouse in Stoyanka exploded/burned up in 2015. That's impossible. We see it untouched on dated images inf 2019 & April 2020 on Google Earth
Good tool: livingatlas.arcgis.com/wayback
#OSINT protips: Incredibly useful at this stage for journalists assessing the situation in UKR: Street Cameras... Thread
Today showed unmistakably what livestreaming street cameras can offer for open source investigators/Journalists. How to find them?
Search on Youtube for live camera on the filter, for "Камера"...
There are various YouTube accounts that r immediately of great value, some started streaming recently, offering #OSINT intel to investigators... Wont call them out because I dont want them to close down. But especially in ODESSA there is one of GREAT value. Hope more open up
The Russian-triggered Ukraine border tension involves increasingly incidents around critical infrastructures, especially around #pipelines
A short #OSINT thread on working with data on pipelines and tools that help in the process (1)
Yesterday, a UKR armed forces officer posts a video of a burning electricity plant. Filmed @ Luhansʹka Power Station in Schastia, as @bibken geolocated, we find the name of the assoc. city mentioned. Then google dork the plant. Rest is SOP #GEOSINT (2)
Another example: few days earlier showed the value of ready-at-hand geo-information on pipeline infrastructure:
Media name-drops pipeline involved in a blast, in UKR. Problem: Druzhba gas pipeline isnt involved in breakaway Luhansk. Easy factcheck with interactive maps here (3)
On July 15, 2021, one girl, three boys, a doctor, an engineer, and a bunch of other civilians get killed in an Afghan airstrike. The reconnaissance plane coordinating bombing w. AAF fighter jets spotted & IDed as a Pilatus PC-12
Our #swissarms story out, a quick #OSINT thread
Video analysis shows a range of bombing videos tweeted by @ro_modafghan. Crosshair & other details such as the flying speed, verified via MGRS calculator (legallandconverter.com/p50.html) corroborate type of reconnaissance plane used.
Pic: MOD boasting w PC12 plane (2)
Mainly Google/Twitter/FB dorks w. Persian translation helped the team. It verified early images of a missing plane, when a Taliban Badri 313 "Special Forces" soldier is IDed on other footage (3)
Helpful dorking cheatsheet here: gbhackers.com/latest-google-…
Investigating crypto scams? Here is some of my go-to #OSINT toolbox for journalists (Thread)
First: I check Etherscan to get a feel for transactions, their volume & frequency of trading.
Discrepancies may occur if coins receive few big amounts & lots of small ones. The big hitters could be a sign of something odd at play. CSV export posbl etherscan.io/address/your-a…
Second: If you investigate new coins, they usually issue whitepapers. It typically explains how capital is raised, in what stages, and also should: what anti-money laundering checks are in place. Does the founder let investments run via their private account?...
Quick #OSINT Thread: how to determine the exact location of a photographer, time, date... from an image and a few other details. A few months back I ran some training on the matter... Where is this? (1)
(2) Reverse image search of the little red sign, reveals its owner, the SBB, Swiss rail service. Check IP address via IP Lookup, which narrows it down to Zürich City... (use a web scraper to create a polygon area for location estimates) iplocation.net #OSINT
(3) By now, it should have dawned on you, which Hotel building the shadow throws onto a train station and the name of a new popuphotel. Dare a guess for the wifi name, via Wigle shows you access points... another way of confirming the location... #OSINT wigle.net