Research Paper
BLOODHOUND: What Influence Operations Look Like When You Can't Read the Mail
Most CIB detection systems need to read messages. BLOODHOUND doesn't. This working paper presents a multi-layer detection system that finds coordinated influence operations using only behavioral metadata — posting entropy, distributional fingerprints, coordination graphs, and information flow. It catches 94% of the IRA's active accounts without touching content, identifies exactly where behavioral analysis hits its ceiling, and doesn't pretend the ceiling isn't there. The full paper includes methodology, code-level architecture, negative results, and every assumption that could break it.
Read Paper →