human rights watch

fredag 6 mars 2026

the Treadstone 71, an American intelligence firm says: 📌“Reza Pahlavi is nothing more than a digital tool serving the mullahs’ regime.”

 




the Treadstone 71, an American intelligence firm says:

 📌“Reza Pahlavi is nothing more than a digital tool  serving the mullahs’ regime.”

The Anatomy of a Mirage: Treadstone 71 Forensic Audit Exposes the Industrial-Scale Manufacturing of Reza Pahlavi’s Digital Support.

A comprehensive new forensic investigation by the intelligence firm Treadstone 71 has lifted the veil on the digital infrastructure surrounding Reza Pahlavi, revealing a massive, automated simulation of support designed to manufacture political legitimacy. The report, titled “Coordinated Inauthentic Behaviour – Deceptive Amplification – Pahlavi – Monarchists – IRGC,” provides irrefutable technical evidence that Pahlavi’s perceived online popularity is not the result of a grassroots movement, but the product of an industrial-scale “hollow army”.


Drawing on a merged dataset of over 70 million account records—including follower CSVs, comment logs, and Telegram exports spanning from January 2022 to November 2025—the Treadstone 71 investigation exposes a symbiotic relationship between this artificial network and the Iranian regime’s security apparatus.


The following is a detailed technical breakdown of the machinery behind the deception.


1. The Forensic Foundation: A Dataset of 70 Million Records

The investigation’s conclusions are based on a massive “Data Merging and Normalization” process. Analysts fused follower datasets from X (formerly Twitter) and Instagram with comment export files to create a unified master table containing over 70 million records.


To bypass the obfuscation tactics used by bot operators, the Treadstone 71 forensic team employed advanced normalization techniques:


NFKC Unicode Normalization: Standardizing characters to prevent bots from hiding behind “lookalike” symbols.

Homoglyph Sanitization: Detecting accounts that substitute Latin characters with Cyrillic or Greek equivalents (e.g., using a Cyrillic ‘a’ in ‘pahlavi’) to evade string-matching filters .

Digit Remapping: Converting Persian/Arabic-Indic digits (e.g., ۱۴۰۱) into ASCII to track numerical patterns in usernames .

This rigorous cleaning process revealed a network structure that is mathematically impossible to attribute to organic human behavior.


2. The “Hollow Army”: Mathematical Proof of Manufacturing

The core of the investigation focuses on the “quantitative metrics” of Pahlavi’s follower base. The data does not describe a community; it describes a factory .


The Metronome Signature (MCI = 1.0)

Perhaps the most damning finding is the timing of account creation. Forensic analysis of 356,941 followers of @pahlavireza on X revealed a machine-perfect pattern.


The 60-Second Grid: For these accounts, 100% of the positive intra-day creation gaps were exact multiples of 60 seconds.

Metronome Coherence Index (MCI): The MCI for this cluster is 1.0, meaning there is zero “human jitter.” Real humans engage at irregular intervals (e.g., 37 seconds, 2 minutes 14 seconds). This network creates accounts at 00:01, 00:02, 00:03, with mechanical precision .

Run-Length of Perfect Grid (RPG): On peak “factory days” in June 2025, the system produced streaks of over 1,200 consecutive accounts without breaking this 60-second rhythm.

“Day-Zero” Swarms and Inventory Management

The follower growth is not organic; it is “provisioned” in bulk. The report identifies specific “Swarm Days” where the network restocks its inventory:


June 2025: In a single month, the system manufactured over 90,000 new follower accounts.


Delivery Schedule: Ten specific days in June accounted for the vast majority of this growth, functioning as “delivery days” rather than viral moments .


Sleeper Bots: Over 80% of these accounts remained dormant immediately after creation, a tactic known as “aging” to bypass platform heuristics that flag new accounts.


Identity Sparsity and Ratio Anomalies

The visual representation of this army is equally hollow:


Blank Bios: Over 3.5 million accounts linked to the network have completely empty biography fields.

Ratio Failure: On Instagram, 89.54% of @officialrezapahlavi followers failed standard follower-to-following ratio tests. These accounts typically follow thousands of users while having fewer than 50 followers themselves, identifying them as “paid-boost pools” .

3. Forensic Linguistics: The “Scripted Voice”

The Treadstone 71 investigation applied “stylometric entropy analysis” to the comments and posts generating Pahlavi’s engagement. The findings confirm that the “voice” of this movement is procedural, not expressive .


Stylometric Entropy Collapse

Human conversation is complex and unpredictable, typically registering a lexical entropy score above 0.7.


The Collapse: During engagement bursts, the entropy of Pahlavi-aligned comments collapses to below 0.35.

Duplicate Strings: Over 55% of comments across X and Instagram are exact string duplicates. Another 23% are “near duplicates,” differing only by a single emoji or punctuation mark.

Linguistic Fingerprints and “Twin” Accounts

The report identified “linguistic fingerprints” that link thousands of ostensibly separate accounts to a single operator:


Shared Typos: Specific, unique errors (e.g., “We king again Iran”) appear across thousands of accounts simultaneously .

Stylometric Twins: Pairs of accounts were observed posting identical text at identical seconds, a phenomenon impossible in organic discourse .

Language Switching: The scripts cycle mechanically between Native Persian, Finglish (transliteration), and broken English to evade spam filters.

4. Cross-Platform Orchestration: The Deception Lifecycle

The operation is not limited to one platform; it utilizes a “Cross-Platform Echo Funnel” to launder content and simulate viral momentum .


The Screenshot Proof Circuit

The network creates a “closed proof loop” to manufacture consensus:


Origination: A seed post is created on X (Twitter).

Laundering: Within minutes, the post is screenshotted and shared to Instagram Stories.

Coordination: The Instagram content is mirrored to Telegram channels.

Validation: The Telegram post is screenshotted and reposted back to X as “proof” of widespread support.

Forensic analysis of SHA-256 media hashes confirmed that identical image files were appearing across X, Instagram, and Telegram within minutes of each other, ruling out coincidental sharing .

Dual-Use Actors

The Treadstone 71 investigation identified a cluster of over 450,000 “dual-use actors.” These are accounts that appear in both the follower-inflation datasets and the comment-spam logs, proving that the numbers and the engagement are generated by the same infrastructure .


5. Campaign Fraud: The “Rise Iran” Signature Scandal

The deception extends beyond social media metrics to direct political fraud. The report provides a forensic audit of the “Rise Iran” signature campaign launched on October 9.


Mechanical Cadence: A graph of signatures per minute revealed “flat-rate blocks” and “synchronized pauses” rather than the natural curve of human participation.

Statistical Impossibility: The data showed a near-perfect autocorrelation (0.976) and unnatural vertical stacking, confirming that signatures were injected by a script running a loop, not by individuals signing a petition .

6. “LocationGate” and Strategic Symbiosis with the Regime

One of Treadstone 71’s most critical findings is the “LocationGate” exposure, which revealed that the Pahlavi network has transitioned from a liability to a strategic asset for the Islamic Republic .


The “Iran Android App” Leak

A transparency update on X inadvertently revealed the true geographic origin of thousands of “monarchist” accounts.


White SIMs: Accounts claiming to be Western-based opposition were found to be operating from inside Iran using the “Iran Android App.” This indicates access via “White SIM cards”—unfiltered internet privileges granted strictly to regime security and intelligence

operatives .

The Trojan Horse: The report describes a “Trojan Horse” dynamic where the Pahlavi network provides the “wooden horse” (fake follower counts), while regime operatives hide inside it to steer the narrative .

The “Inquisitor” Protocol

The investigation details how the regime actively injects slogans like #ThisIsTheFinalBattle into the Pahlavi network.


Seeding: Regime assets (e.g., the account “Arezu”) seed a monarchist slogan.

Amplification: The Pahlavi bot network, detecting the trend, mass-amplifies it.

Validation: The regime then points to this bot activity as “proof” that the opposition is foreign-backed and inauthentic, validating their repression.

This “Grand Inquisitor” strategy allows the regime to crowd out genuine democratic alternatives with a polarized, easily manipulated figurehead.


7. Psychological Engineering: Martyr Hijacking and Extremism

The network creates emotional resonance through “Emotional Token Cloning” and “Symbol Saturation” .


Hijacking Grief

Operators systematically hijack the names and images of protesters like Mahsa Amini, Neda Agha-Soltan, and Navid Afkari. Accounts such as navidforfreedom or mahsafree are not memorials; they are “emotional bait” templates used to trigger guilt and solicit donations during campaign windows .


Extremist Contamination

The Treadstone 71 investigation also documented “Extremist Contamination” within the network. Accounts functioning as key amplifiers were found to openly display Nazi swastikas (“Barcode卐”) and fascist iconography alongside monarchist slogans . The report notes that Pahlavi’s failure to disavow these elements constitutes “strategic consent,” accepting support from toxic fringes to maintain the illusion of a broad coalition .


8. Conclusion: A Manufactured Mandate

The Treadstone 71 report concludes that Reza Pahlavi’s digital prominence is a “simulacrum”—a manufactured fiction built by engineers, not citizens. The “metronome” timing, the industrial manufacturing of followers, and the scripted linguistic patterns provide indisputable evidence of a Coordinated Inauthentic Behaviour (CIB) operation.


Crucially, this “hollow army” has become a weapon in the hands of the very regime it claims to oppose. By inflating a synthetic opposition figure, the operation allows the Islamic Republic to frame all dissent as inauthentic, effectively arming the regime against the Iranian people .


As the report states in its final summary: “The machine exists to manufacture relevance, protect status, and exploit national grief for strategic advantage… Authenticity is not earned. It is replicated.”

👇👇👇

https://irannewsupdate.com

Inga kommentarer:

Skicka en kommentar