Today, in between all the election craziness, the DOJ seized more Iranian domains that were used to push disinfo to not just American, but global audiences: https://www.justice.gov/opa/pr/united-states-seizes-27-additional-domain-names-used-iran-s-islamic-revolutionary-guard-corps. I am so incredibly proud of the work my team of talented analysts did in uncovering...
...this vast network and first exposing Iran's activity in the IO space back in 2018, and its continued work on this since. You can read the FBI affidavit here, which references not just our public 2018 report, but our extensive non-public reporting, no less than 37 times...
... https://www.justice.gov/opa/press-release/file/1334551/download, and our original 2018 report here: https://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html
Also be sure to check out some of the excellent investigative reporting on this Iranian activity set that journalists like @donie ( https://www.cnn.com/2020/01/24/tech/iran-info-ops/index.html)...
...and @jc_stubbs and @Bing_Chris ( https://www.reuters.com/article/us-usa-iran-facebook-exclusive/exclusive-iran-based-political-influence-operation-bigger-persistent-global-idUSKCN1LD2R9) have done.
Lastly, if you're interested in the team and process behind all the work referenced in the affidavit, check out my favorite write up from @kateconger from 2018
https://www.nytimes.com/2018/08/23/technology/fireeye-facebook-disinformation.html.

Working in this field can be incredibly stressful at times (right now), but few things can beat the satisfaction you feel when you see your people's work directly used to support real-world actions like today's.