0 0
Read Time:7 Minute, 6 Second

حمله کنیم مسیح یعنی ؟کاری کنیم ارام برود استراحت ایا ‌؟

https://help.twitter.com/en/rules-and-policies/twitter-rules#hateful-conduct

Safat Cyber Campaign Group
  Today’s operational line topics

  • The death of Mrs. Afife Shalier Rasouli
  • Reciprocal action with the ugly and heinous act of tearing Haj Qasim’s photo
  • Destroying the house of devils like Masih Alinejad and…

While we support each other’s tweets, invite your Twitter friends to the group
Thank you

@twitter

Iran continues to skirt the lines of Twitter decorum with verbal attacks against anything and anyone running counter to the Islamic Revolution.


HYBRID OPERATIONS AND COGNITIVE WARFARE ACTIONS – IRANIAN INTELLIGENCE

Since 2019, massive demonstrations against Iran and its influence broke out in Iraq and Lebanon, followed by internal protests against Iran’s totalitarian ideology. Internally, Iranians are demanding the dissolution of the clerical regime. Demonstrations occur daily in Iran with protests over inflation, economic disparities, water shortages, teacher pay, soaring food prices, and unemployment. The government meets these demonstrations with brutal repression, killing hundreds. Physical confrontations lead to arrests, and arrests lead to torture. Torture leads to panicked confessions elicited under extreme duress. The government uses this information to arrest other Iranians in an ongoing dragnet used to preserve the theocracy. Iranian citizens want their own identity, not the transnational community of believers that is the ummah, as Khomeini prefers. Instead of a national identity, Khomeini pushes the doctrine of velayat-e faqih, meaning the supreme guardianship of the Islamic jurist – better known as a system of governance justifying the rule of the clergy over the state. The religious leadership controls all political and religious authority. All Iran’s critical decisions run through the supreme leader. The supreme leader governs all organs of Iran. No one has any say over the conduct of the supreme leader. Anything contrary to his word is considered direct disobedience to Allah. Iran rules by way of violence. The supreme leader established a brutal theocracy that has run out of ideas, surviving under the auspices of fascist rule.

Many people in Iran are not allowed to have an education or work because of their religion. Because of their beliefs, even more are jailed or murdered in the streets and prisons. In addition, the regime repeatedly calls ordinary citizens and activists traitors and spies. The National Information Network, better known as the Iranian intranet, filters most internet traffic while interrogating content for anything contrary to revolutionary ideals. The government fears open discussion, the free flow of information, and thought. Soon, the government will pass a law criminalizing the production and distribution of censorship circumvention tools while authorizing more in-depth electronic surveillance. These are the last gasps of a government on the downward slope of its tenure.

In the report, Iranian Influence Operations, dated July 17, 2020, Treadstone 71, we had noticed spikes in Twitter activity surrounding specific hashtags. The primary hashtag targeted Maryam Rajavi. Maryam Rajavi is the leader of the People’s Mujahedin of Iran, an organization trying to overthrow the Iranian government, and the President-elect of its National Council of Resistance of Iran (NCRI).[1] July 17, 2020, represented the #FreeIran2020 Global Summit online for the NCRI. The report tracked Twitter and other social media activity surrounding the Global Summit.

The 2022 Global Summit begins this weekend. We noticed increased Iranian social media activity mirroring the same negative type posts against the People’s Mujahedin of Iran leadership. Current postings are likely preparing for new operations using social media to counter any opposition messaging. The most recent posts again reflect the use of antagonizing hashtags including #Maryam_Rajavi_is_terrorist and hashtag used in 2020. Read the new report.

Download the Report


  1. The Twitter Rules

The Twitter Rules

Twitter’s purpose is to serve the public conversation. Violence, harassment and other similar types of behavior discourage people from expressing themselves, and ultimately diminish the value of global public conversation. Our rules are to ensure all people can participate in the public conversation freely and safely.
 

Safety


Violence: You may not threaten violence against an individual or a group of people. We also prohibit the glorification of violence. Learn more about our violent threat and glorification of violence policies. 

Terrorism/violent extremism: You may not threaten or promote terrorism or violent extremism. Learn more.

Child sexual exploitation: We have zero tolerance for child sexual exploitation on Twitter. Learn more.

Abuse/harassment: You may not engage in the targeted harassment of someone, or incite other people to do so. This includes wishing or hoping that someone experiences physical harm. Learn more.

Hateful conduct: You may not promote violence against, threaten, or harass other people on the basis of race, ethnicity, national origin, caste, sexual orientation, gender, gender identity, religious affiliation, age, disability, or serious disease. Learn more

Perpetrators of violent attacks: We will remove any accounts maintained by individual perpetrators of terrorist, violent extremist, or mass violent attacks, and may also remove Tweets disseminating manifestos or other content produced by perpetrators. Learn more

Suicide or self-harm: You may not promote or encourage suicide or self-harm. Learn more.

Sensitive media, including graphic violence and adult content: You may not post media that is excessively gory or share violent or adult content within live video or in profile or header images. Media depicting sexual violence and/or assault is also not permitted. Learn more

Illegal or certain regulated goods or services: You may not use our service for any unlawful purpose or in furtherance of illegal activities. This includes selling, buying, or facilitating transactions in illegal goods or services, as well as certain types of regulated goods or services. Learn more.

Privacy


Private information: You may not publish or post other people’s private information (such as home phone number and address) without their express authorization and permission. We also prohibit threatening to expose private information or incentivizing others to do so. Learn more.

Non-consensual nudity: You may not post or share intimate photos or videos of someone that were produced or distributed without their consent. Learn more.
 

Authenticity


Platform manipulation and spam: You may not use Twitter’s services in a manner intended to artificially amplify or suppress information or engage in behavior that manipulates or disrupts people’s experience on Twitter. Learn more.

Civic Integrity: You may not use Twitter’s services for the purpose of manipulating or interfering in elections or other civic processes. This includes posting or sharing content that may suppress participation or mislead people about when, where, or how to participate in a civic process. Learn more.

Misleading and Deceptive Identities: You may not impersonate individuals, groups, or organizations to mislead, confuse, or deceive others, nor use a fake identity in a manner that disrupts the experience of others on Twitter. Learn more.

Synthetic and manipulated media: You may not deceptively share synthetic or manipulated media that are likely to cause harm. In addition, we may label Tweets containing synthetic and manipulated media to help people understand their authenticity and to provide additional context. Learn more.

Copyright and trademark: You may not violate others’ intellectual property rights, including copyright and trademark. Learn more about our trademark policy and copyright policy.
 

Enforcement and Appeals


Learn more about our approach to enforcement, including potential consequences for violating these rules or attempting to circumvent enforcement, as well as how to appeal.
 

Third-party advertising in video content


You may not submit, post, or display any video content on or through our services that includes third-party advertising, such as pre-roll video ads or sponsorship graphics, without our prior consent.

Note: we may need to change these rules from time to time in order to support our goal of promoting a healthy public conversation. The most current version is always available at https://twitter.com/rules.

Share this article

Tweet

https://help.twitter.com/medallia/2.41.1_20220215232600/liveApp/2.41.1/form-app-web.html?formId=1149&type=live&isMobile=true&referrer=https%3A%2F%2Fhelp.twitter.com%2Fen%2Frules-and-policies%2Ftwitter-rules%23hateful-conduct&region=digital-cloud-us-prem&displayType=embedded&isSeparateFormTemplateFromData=true

Twitter platform

Twitter, Inc.

Help

Developer resources

Business resources

© 2022 Twitter, Inc.

Cookies

Privacy

Terms and conditionsEnglish 

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence