Suspicious Twitter accounts artificially amplify Sudanese paramilitary leader amid armed conflict

Network of accounts routinely copy-pastes content to promote pro-RSF narratives and its leader, Mohamed Hamdan “Hemedti” Dagalo

Suspicious Twitter accounts artificially amplify Sudanese paramilitary leader amid armed conflict

Share this story
THE FOCUS

Rapid Support Forces leader General Mohamed Hamdan Dagalo speaks during a press conference at RSF headquarters in Khartoum, February 19, 2023. (Source: Reuters/Mohamed Nureldin Abdallah//File Photo)

A network of Twitter accounts is promoting the leader of Sudan’s Rapid Support Forces (RSF), Mohamed Hamdan Dagalo, commonly known as Hemedti, by posting copied content and duplicate replies. Tensions between Hemedti and military chief Abdel Fattah al-Burhan escalated to the point of armed conflict on April 15, 2023, with more than 200 civilians dead at the time of writing. The DFRLab also identified a separate Twitter network promoting the RSF and Hemedti, which we covered in a previous case study. With the latest instance, the network’s content appears to fall into three categories: tweets copied directly from the official Twitter accounts of the RSF or Hemedti; posts promoting Hemedti and the RSF; and replies to tweets posted by the RSF and Hemedti.

Prior to the armed conflict between the RSF and al-Burhan’s Sudanese Armed Forces (SAF), the accounts portrayed Hemedti as a reformist general who supports the move toward democracy, a competent leader of a powerful paramilitary force, and a viable future leader for Sudan. After fighting began on April 15, the accounts portrayed Hemedti as a hero fighting to protect Sudan and cleanse the country of traitors.

Often the accounts posted the same content within seconds and minutes of one another. Replies to tweets, which were often identical or incredibly similar, mostly praised and thanked both Hemedti and the RSF.

As previously noted, the DFRLab also examined a network of potentially hijacked accounts used to promote the RSF, which utilized accounts that had been dormant for years. This latest network differs in that the accounts appear to be new. The majority of accounts were created in late 2022, around the same time Hemedti claimed the 2021 military coup, which overthrew the transitional government, was a failure.

These instances are not the first time the DFRLab has reported on suspicious tactics used to promote the RSF. In October 2021, Facebook parent company Meta de-platformed a network promoting the RSF and Hemedti for “coordinated inauthentic behavior on behalf of a foreign or government entity.” The network included page administrators based in Saudi Arabia and the United Arab Emirates, both of which have long-standing relationships with the RSF.

Some high-engagement accounts that formed a significant part of the latest network identified by the DFRLab were previously investigated by Beam Reports, a Sudanese media outlet focused on fact-checking and disinformation investigations. Beam Reports has documented other examples of potentially fake or inauthentic accounts used to promote the RSF on multiple social media platforms.

Methodology

To identify the suspicious accounts promoting Hemedti and the RSF, the DFRLab used a dataset initially created to classify a potentially hijacked network of Twitter accounts that boosted content posted by the official accounts of the RSF and Hemedti. The dataset contained 4,882 accounts that liked at least one tweet from either of the official accounts. As noted in our prior report, we observed some inconsistencies between the data publicly visible on Twitter’s website and the data collected via API. For example, in a number of cases, Twitter’s website would show that particular account had liked a tweet by the RSF, but this was not reflected in the collected API data. As a result of these current inconsistencies between Twitter’s website and API, it is likely that the total number of accounts we identified is an undercount.

For this research, the DFRLab focused on the most engaged accounts that liked, replied to, and shared tweets by Hemedti and the RSF, in addition to posting copied and original promotional content. The high engagers appeared to primarily like and retweet content from the official RSF account rather than Hemedti’s account. However, the accounts mentioned Hemedti in their own tweets or in replies to Hemedti’s tweets. Most of their original tweets promoted Hemedti as an individual leader rather than the RSF as a paramilitary group.

The majority of accounts the DFRLab identified as part of this copy-paste network appear to have been created between July and October 2022, with many created on the same day. For example, three high engagers were created on August 3, 2022, within thirteen minutes of one another. At least nine highly-engaged accounts consistently interacted with the accounts of the RSF and Hemedti in a similar fashion, including mentions, retweets, and the use of specific hashtags, like #قوات_الدعم_السريع (#Rapid_Support_Forces).

Table showing nine accounts with similar high engagement numbers. (Source: DFRLab via Twitter API, TweetBeaver, and TruthNest)
Table showing nine accounts with similar high engagement numbers. (Source: DFRLab via Twitter API, TweetBeaver, and TruthNest)

Copying promotional content

Many of the accounts copied content directly from the Facebook pages and Twitter accounts of Hemedti and the RSF, sharing it as if it were their own content.

On April 17, ten accounts shared a shortened version of a video originally posted by the RSF hours earlier. The accounts cropped the video, which alleged to show RSF members taking control of Merowe airport, to highlight RSF soldiers celebrating in front of a banner with the airport’s name. The RSF originally surrounded Merowe airport on April 12, resulting in the SAF issuing a warning that the move could result in conflict. The accounts shared the video between 3:20pm and 3:30pm Central Africa Time, each posting in one-minute intervals.

Screenshots of two accounts that shared the same shortened version of a video originally posted by the RSF within four minutes. (Source: @khald30017245/archive, left; @saprapwlkasm/archive, right)
Screenshots of two accounts that shared the same shortened version of a video originally posted by the RSF within four minutes. (Source: @khald30017245/archive, left; @saprapwlkasm/archive, right)

In a similar example, eighteen accounts copied a video and text from an RSF tweet posted on February 23. The accounts, which all posted their content within three hours of the original RSF post, used a cropped version of the video that removed the first eight seconds of footage. The eighteen accounts copied the RSF’s Arabic text, which translated to “Multiple victories… Mobile Desert Shield Rapid Support Forces.” While the RSF used the hashtags #sudan and #RSF, the eighteen copypasta accounts used the hashtagsقوات_الدعم_السريع # (“Rapid_Support_Forces”) and #جاهزية_سرعة_حسم (Accessibility_Rapidity_Resolvedly).

Screenshots of three accounts (bottom) that copied an RSF tweet (top), changing the hashtags and posting the video within four minutes of one another. Tweet timestamps in Central Africa Time. (Source: @RSFSudan/archive, top; @synldqly1/archive, bottom left; @khlyft_mhnd/archive, bottom center; @dlmmdmm1/archive, bottom right)
Screenshots of three accounts (bottom) that copied an RSF tweet (top), changing the hashtags and posting the video within four minutes of one another. Tweet timestamps in Central Africa Time. (Source: @RSFSudan/archive, top; @synldqly1/archive, bottom left; @khlyft_mhnd/archive, bottom center; @dlmmdmm1/archive, bottom right)

Original promotional content

Almost all of the identified accounts posted some form of original content that was not copied directly from the official Twitter accounts of Hemedti or the RSF. These tweets consisted of content promoting the RSF and Hemedti or summaries of content from their Twitter accounts.

On April 16, ten accounts posted an image of Hemedti saluting troops, with a message praising him as a leader who will cleanse Sudan of “traitors and hypocritical revolutionaries.” The accounts posted the image and text within six minutes of one another.

Screenshots show two of ten accounts that shared, within the same minute, an image promoting Hemedti as a hero. (Source: @abwbakraltup/archive, left; @sakralart123/archive, right)

The accounts in this network regularly tweeted headlines that included positive news about the RSF and Hemedti, or articles that situated Hemedti as a potential ruler. For example, on April 10, twenty-four accounts tweeted a post copied from the official account of Saudi outlet Al Arabiya. The accounts tweeted in three batches. The first batch of nine accounts tweeted between 8:28am and 8:32am and included the same text as the Al Arabiya post but removed the hashtags. A second batch of nine accounts tweeted between 9:55 am and 9:58 am and included a cropped version of the original Al Arabiya tweet, removing all references to Al Arabiya. The third batch comprising six accounts tweeted between 11:31am and 11:36am, using the text from first batch and the image from the second batch.

Screenshots show that the original tweet from Al Arabiya (left) contained two hashtags that were removed from the first batch of tweets (center), while the text, hashtags and Al Arabiya logos were removed in the second batch of tweets (right). The Arabic text reads, “Sudanese Rapid Support Forces: we need a national consensus to reach safety.” (Source: @AlArabiya/archive, left; @khlyft_mhnd/archive, center; @WqyAyhab/archive, right)
Screenshots show that the original tweet from Al Arabiya (left) contained two hashtags that were removed from the first batch of tweets (center), while the text, hashtags and Al Arabiya logos were removed in the second batch of tweets (right). The Arabic text reads, “Sudanese Rapid Support Forces: we need a national consensus to reach safety.” (Source: @AlArabiya/archive, left; @khlyft_mhnd/archive, center; @WqyAyhab/archive, right)

In another instance, on March 11, ten accounts posted a screenshot of a Fox News article within two minutes of one another. In the top right corner of the screenshot is a button that reads in Arabic, “return to WhatsApp.” This indicates that a link to the Fox News article was possibly shared in a WhatsApp group and the screenshot was taken when one of the group members clicked the link. While the article mentions Hemedti’s role in the October 2021 military coup, the screenshot of the article’s title is sympathetic to the paramilitary leader. He is separated from the other military leaders and presented as supportive of the democratic movement, even though Hemedti was still second-in-command of the military council ruling Sudan after the 2021 coup.

Screenshots of four accounts tweeting the same Fox News screenshot within the same minute, with “return to WhatsApp” highlighted in the top right-hand side of each screenshot. (Sources, left to right: @mstafaapbala/archive; @saprapwlkasm/archive; @mhwdaltahr/archive; @aynas17491752/archive)
Screenshots of four accounts tweeting the same Fox News screenshot within the same minute, with “return to WhatsApp” highlighted in the top right-hand side of each screenshot. (Sources, left to right: @mstafaapbala/archive; @saprapwlkasm/archive; @mhwdaltahr/archive; @aynas17491752/archive)

Other tweets written in English were also posted within minutes of each other, indicating a possible attempt to reach a larger, more international audience. In one example, four accounts tweeted identical text of what appeared to be an English summary of a tweet posted by Hemedti in which he stated that he would sponsor a conference that would be used to develop a ten-year plan to better develop Khartoum. The accounts posted within two minutes of one another, and three used the same picture of Hemedti.

Screenshots show two of four identical tweets praising Hemedti. (Source: @myslymn1 /archive, left; @salhhsballh1 /archive, right)
Screenshots show two of four identical tweets praising Hemedti. (Source: @myslymn1 /archive, left; @salhhsballh1 /archive, right)

Due to the copy-paste nature of the network, where large groups of accounts shared the same content within minutes of one another, the accounts themselves often had identical timelines. For example, the nine highest engagers often had almost identical timelines across days and even weeks.

Screenshots show two high engager accounts with identical timelines between April 14 and April 16. (Source: @mhwdaltahr/archive, left; @aynas17491752/archive, right)
Screenshots show two high engager accounts with identical timelines between April 14 and April 16. (Source: @mhwdaltahr/archive, left; @aynas17491752/archive, right)

Similar replies

The DFRLab observed that the accounts in the network frequently replied to tweets by the RSF and Hemedti using copy-pasted text or text that had been slightly edited to include or remove a word or two. For example, identical or very similar text praising Hemedti was used to respond to three tweets posted by the RSF. On January 17, the account @mhwdaltahr replied to an RSF tweet about a meeting between Hemedti, the attorney general of Morocco, and the Moroccan ambassador to Sudan, praising Hemedti by saying, “Hemedti is a man representing an entire country who works for the nation and the citizen.” The text was copied verbatim and used by @aynas17491752 on January 29 when replying to an RSF tweet about a meeting between Hemedti and Ethiopian Prime Minister Ethiopia Abiy Ahmed. Two months later, on March 26, the account @ahmdbas54698745 added a few words to the same text to reply to another tweet about a Hemedti speech, writing, “Hemedti is a man representing an entire country who works for the nation and the citizen, and to preserve safety, security, and stability.”

Screenshots of identical and similar replies to different RSF tweets by three accounts. (Source: @mhwdaltahr / archive, left; @aynas17491752 / archive, center; @ahmdbas54698745 / archive, right)
Screenshots of identical and similar replies to different RSF tweets by three accounts. (Source: @mhwdaltahr / archive, left; @aynas17491752 / archive, center; @ahmdbas54698745 / archive, right)

On March 29, meanwhile, the account @sakralart1123 replied to an RSF tweet with the text, “These forces [the RSF] greatly contributed to maintaining security, safety, and stability across the country.” Four minutes later, the account @mhwdaltahr removed one word and recycled the text to reply to the same tweet.

Screenshots of almost identical replies to the RSF account by two accounts. Source: @mhwdaltahr / archive, left; @sakralart123 / archive, right
Screenshots of almost identical replies to the RSF account by two accounts. Source: @mhwdaltahr / archive, left; @sakralart123 / archive, right

On March 25, accounts @sakralart1123 and @mstafaapbala replied to an RSF tweet promoting a YouTube video with the same text posted ten minutes apart.

Screenshots of identical replies to the RSF account by two accounts. The text, in Arabic, says: “The RSF helped citizens feel safe, secure, and stable.” (Source:, @sakralart123/archive, left; @mstafaapbala/archive, right)

At the time of publication, Sudan’s two military forces were still locked in conflict, both making claims online about territorial control and pointing the finger of blame at one another. The two networks identified by the DFRLab indicate that a portion of the RSF and Hemedti’s social media engagement could be coming from potentially hijacked and suspicious accounts attempting to influence the online narrative.


Cite this case study:

Tessa Knight, “Suspicious Twitter accounts artificially amplify Sudanese paramilitary leader amid armed conflict,” Digital Forensic Research Lab (DFRLab), April 19, 2023, https://dfrlab.org/2023/04/19/suspicious-twitter-accounts-artificially-amplify-sudanese-paramilitary-leader-amid-armed-conflict


Further Reading