%% automatically updated by tag fake-account at 2024-06-20T18:25:45.805Z %% **So, you have a suspicious account in front of you, and your goal is to understand whether there is a real person behind it or if it is an artificial entity designed to deceive.** This instruction will help you to consistently apply the most useful techniques to get things done. For your convenience, you can click on checkboxes to mark the techniques you've already utilised (changes will not be saved after refreshing the page). For an understanding of the general method of application, please go to the [[Instructions logic]] page. ### Hypotheses - A social media account spreads a typical message ignoring replies and not engaging in communication. - A social media account was registered recently, which means it is highly likely to be a new virtual identity, so it's a fake or bot. ### 1 step Start with the following techniques to **get the list of useful sources**. This step will provide you with directions for investigations and hypotheses to test. ### 2 step Use collection techniques to **gather data, extract information and validate it**. These techniques are the most extensive, so select them based on the data sources and hypotheses obtained in the previous step. - [ ] [[SOTL-5.1. Check Initial Activity]] - [ ] [[SOTL-7.1. Check Archives]] - [ ] [[SOTL-7.4. Conduct Reverse Image Search]] - [ ] [[SOTL-17.1. Conduct Search By Face]] ### 3 step If needed, apply the necessary techniques to **perform an analysis of information and a synthesis of the conclusion**. Often, on the second step, it's feasible to do it manually. - [ ] [[SOTL-1.1. Check Account Creation Date]] - [ ] [[SOTL-1.4. Analyze Internal Identifiers]] - [ ] [[SOTL-2.6. Check Most Frequent Friends' Data]] - [ ] [[SOTL-2.7. Studying of Nth level connections]] - [ ] [[SOTL-3.12. Analyse the Artificialness of Content]] - [ ] [[SOTL-5.4. Study Time Of Posts And Actions]] - [ ] [[SOTL-5.6. Analyze Content With Word Clouds]] - [ ] [[SOTL-5.7. Display Activity on a Timeline]] Additionally, you can delve into related weaknesses and functionalities in more detail if your case is complex and requires a thorough understanding of the topic. ```mermaid timeline title Instruction workflow Planning techniques : undefined : undefined : undefined : ... : You defined sources to check Collection techniques : SOTL-5.1. Check Initial Activity : SOTL-7.1. Check Archives : SOTL-7.4. Conduct Reverse Image Search : ... : You gathered data, extracted and verified information Analysis techniqies : SOTL-1.1. Check Account Creation Date : SOTL-1.4. Analyze Internal Identifiers : SOTL-2.6. Check Most Frequent Friends' Data : ... : You analyzed information and got intelligence