Case File: E2/DOSSIER 05

Disinformation Network

Coordinated Inauthentic Behavior Mapping

Threat ClassInformation Operations
Intelligence SectorMedia & Political Analysis
Risk LevelHigh
Operational Status
Active
3:2Dossier Document Spread
Mission Brief

Map and attribute a coordinated inauthentic behavior network targeting public discourse around [REDACTED] policy topics across multiple social media platforms. The operation was first flagged by an independent media watchdog.

Investigation Scope

Cross-platform social media analysis, bot network detection, content amplification pattern mapping, temporal correlation analysis, attribution indicators.

Deliverables
  • Identify the scope and scale of the inauthentic network
  • Map content amplification and distribution chains
  • Establish temporal patterns and operational cadence
  • Identify probable attribution indicators
  • Document network topology for platform reporting
  • Develop monitoring framework for ongoing detection
Confidence LevelMedium
Initial Signals
  • Cluster of accounts with identical creation timestamps
  • Content posting cadence aligned with [REDACTED] timezone business hours
  • Profile images traced to GAN-generated face databases
  • Cross-platform content replication with <60s propagation delay
  • Engagement patterns inconsistent with organic user behavior
Subject Profile

[REDACTED] Network Cluster

Approximately 340+ accounts operating across 3 major platforms with coordinated messaging patterns. Activity period: 2023.Q4 – present.

Investigation Timeline
Sequential Workflow
01
Signal Detection
02
Account Clustering
03
Content Analysis
04
Temporal Mapping
05
Network Topology
06
Attribution
07
Monitoring
21:9Interstitial Atmospheric Asset

Evidence Board

Key Artifacts & Correlations
16:10FILE_01
FILE_012024.08.02

Account Creation Timeline

Cluster analysis of 340+ accounts

4:3FILE_02
FILE_022024.08.05

GAN Detection Analysis

Profile image authenticity assessment

16:10FILE_03
FILE_032024.08.08

Content Propagation Map

Cross-platform amplification chains

4:3FILE_04
FILE_042024.08.12

Temporal Cadence Chart

Activity heatmap by hour/timezone

4:5FILE_05
FILE_052024.08.15

Network Graph Export

Node-edge relationship visualization

4:3FILE_06
FILE_062024.08.18

Narrative Taxonomy

Topic classification and messaging themes

3:2FILE_07
FILE_072024.08.22

Attribution Indicators

Language analysis and infrastructure links

4:3FILE_08
FILE_082024.08.25

Platform Report Package

Formatted for submission to trust & safety teams

Analytical Findings

Key Conclusions
  • 01

    Network consists of 340+ coordinated accounts across 3 platforms, with an additional ~1,200 amplifier accounts.

  • 02

    Content creation centralized in a small number of accounts, with distribution handled by automated amplification layers.

  • 03

    Operational cadence strongly correlated with UTC+3 business hours, with notable gaps during [REDACTED] public holidays.

  • 04

    GAN-generated profile images detected in 78% of core network accounts using reverse image and artifact analysis.

  • 05

    Narrative focus aligned with specific policy topics, suggesting directed rather than opportunistic information operations.

  • 06

    Infrastructure overlap identified with previously documented campaigns attributed to [REDACTED] operational cluster.

Risk Assessment Matrix
Network ScaleHigh
Attribution ConfidenceMedium
Narrative ImpactHigh
Platform ResponseMedium
Overall Risk LevelHigh
Strategic Recommendation

Continue monitoring. Platform reports submitted. Recommend integration into ongoing threat intelligence feed for early detection of network reconstitution.

MONITORING ACTIVE

Case Outcome

Client Impact

Platform reports resulted in removal of 280+ accounts. Network showed signs of reconstitution within 3 weeks, prompting establishment of continuous monitoring framework. Investigation remains active.

Final ResultOngoing
3:2Outcome Documentation