JUICYJAM: How Thai Authorities Use Online Doxxing to Suppress Dissent

by oqtey
JUICYJAM: How Thai Authorities Use Online Doxxing to Suppress Dissent

A sustained, coordinated social media harassment and doxxing campaign – which we codenamed JUICYJAM – targeting the pro-democracy movement in Thailand has run uninterrupted, and unchallenged, since at least August 2020. We define doxxing as the search for and the publication of an individual’s personal data on the Internet with malicious intent, in this instance, to suppress and harass the Thai pro-democracy movement. The operation utilized an inauthentic persona over multiple social media platforms (primarily X and Facebook) to target pro-democracy protesters by doxxing individuals, continuously harassing them, and instructing followers to report them to the police. Through our analysis of public social media posts we determined that the campaign was not only inauthentic, but the information revealed could not have been reasonably sourced from a private individual. Thanks to a public leak of confidential military and police documents in March 2025, we can now attribute the campaign to the Royal Thai Armed Forces and/or the Royal Thai Police. With a high rate of following and engagement across platforms, JUICYJAM is an uncommon instance of a successful state-sponsored influence operation. JUICYJAM’s tactics support a larger network of judicial harassment and democratic suppression that is infrequently enforced by social media platforms, but poses a significant threat to civil society. 

  • Since at least August 2020, a coordinated social media harassment and doxxing campaign targeting the Thai pro-democracy movement has run uninterrupted and unchallenged. We codenamed it JUICYJAM. 
  • Thanks to a public leak of confidential military and police documents that occurred in March 2025, we can now attribute the campaign to the Royal Thai Armed Forces and/or the Royal Thai Police, whose online repression efforts have allegedly been merged into a joint “Cyber Team” since 2023.
  • The campaign operates within a broader context of dissent repression tactics, both online and offline, that closely resemble those we have previously analyzed in other regions – such as, for example, in Hong Kong.
  • JUICYJAM’s longstanding, uninterrupted activity over multiple social media platforms (primarily X and Facebook) once again exposes the shortcomings of platforms in creating and enforcing policies on highly coordinated and harmful doxxing campaigns intended to suppress civil society. 
  • Platforms’ policies on doxxing seldom consider the behaviour in the context of coordinated – and often state-sponsored – campaigns against civil society. They also do not consider environmental factors, such as the doxxing happening during unrest and protests.

In 2014, Thailand faced its second military coup of the century, placing a military junta – the National Council for Peace and Order – in power. The junta immediately imposed martial law, ratified a military-backed constitution, and, in 2019, the former army chief who led the coup, Prayuth Chan-o-cha, was elected Prime Minister. In July 2020, youth-led pro-democracy protests broke out across the country, demanding a more democratic constitution and reforms to the monarchy. The protesters were met with severe repression, and after a two-year pause of prosecutions, in November 2020, Prime Minister Prayuth ordered authorities to bring back the enforcement of lèse-majesté, or Section 112 of the Criminal Code, which criminalizes “insulting the monarchy”. Thailand’s use of lèse-majesté has been both arbitrary and prolific; protesters can be arrested for as little as sharing social media posts that are ‘insulting to the monarchy’. Furthermore, the weaponization of lèse-majesté has devastating consequences: those convicted under Section 112 face three to 15 years in prison per count. Thai authorities have extensively used lèse-majesté as a tool to punish pro-democracy advocates, with around 270 protesters detained and convicted since 2020.

Weaponizing the judiciary has not been enough, however. Since the 2014 coup, the Thai pro-democracy movement has been heavily targeted through various digital means. In 2022, Citizen Lab researchers uncovered an extensive espionage campaign impacting several groups within the movement, such as FreeYOUTH and WeVo. In fact, one of the authors of this report, Katekanok Wongsapakdee, was also found to be targeted.

Additionally, multiple influence operations (IOs) have been exposed for their attempts to discredit the pro-democracy movement and intimidate its members. In October 2020, the company now called X (formerly Twitter) exposed one of the most notorious online IOs targeting the Thai protest movement when it announced the removal of 926 covertly coordinated accounts. The network of accounts was attributed with high confidence to the Royal Thai Army (RTA). Twitter found the accounts to be “engaging in amplifying pro-RTA and pro-government content, as well as engaging in behavior targeting prominent political opposition figures.”

Further analysis conducted by the Stanford Internet Observatory found that this influence operation did not achieve any relevant traction with legitimate audiences. The authors state that “the accounts had few followers, the tweets received very low levels of engagement, and the magnitude of tweets is unlikely to have effectively diverted public attention”. Despite the relative investment of resources to conduct this operation, it appears to have failed.

Twitter’s takedown did not, however, stop influence operations from being deployed to repress the then still very active pro-democracy protests in Thailand. Within this context, we identified several social media campaigns for research candidates, and singled out one that appeared to show the hallmarks of a well-coordinated, and resourced, influence operation. We set out to investigate the campaign’s footprint, tactics, and to determine attribution. 

We codenamed this operation JUICYJAM.

While compiling our initial analysis on JUICYJAM, there was a significant leak of information from a Member of the Thai Parliament. On March 25, 2025, Thai MP Chayaphon Satondee, released confidential documents allegedly illustrating the influence operation’s machinery put in place by the Thai authorities to quash dissent.

It is important to clarify the following:

  • We could not independently verify the documents as authentic, or complete. The documents were released by a Thai opposition MP, who claimed to have obtained them from “military and police officers who love democracy,” in the context of a general debate for a vote of no confidence in Prime Minister Paethongtarn Shinawatra.
  • The MP claims the documents originated from a joint-forces “Cyber ​​Team” created in 2023. They allegedly contain the “Weekly Cyber ​​Team Operations Report” for August 17-23, 2024, or the first week after Paethongtarn Shinawatra received parliamentary approval to assume the position of Prime Minister, and the report for October 19-25, 2024, or the period after Paethongtarn assumed the position of Prime Minister. 
  • We could review the available documents in detail thanks to the MP making them available on the web, which allowed us to assess them as, at the very least, highly plausible.
    • The documents’ layout, language, and alleged purpose are consistent with those from internal reports produced by a military or law enforcement agency.
    • The documents were reported about in detail by international, as well as local, media, such as the BBC.
    • What caught our attention, however, was the presence, within a set of leaked presentation slides ostensibly explaining the strategy behind the IO, of several tweets where the account’s handle was consistently cut off from the presented screenshot, as if to protect it from inadvertent exposure.
    • Through cross-comparison, we were able to confirm that the tweets seen in the documents had been posted by the X handle we had been researching as the main online asset for JUICYJAM: @jjookklong3.

If authentic, the leaked documents prove JUICYJAM to be a state-sponsored influence operation, designed to suppress the protest groups, and to counter protest narratives, through a variety of aggressive tactics.

Summary

Note: as we have done in previous research, in this report we define doxxing as the search for and the publication of an individual’s personal data on the Internet with malicious intent.

JUICYJAM is a prolific set of social media entities, particularly on X and on Facebook, working in coordination to dox and harass individuals and groups within the broader Thai pro-democracy camp. It centres around a single persona, a supposed middle-aged businesswoman going by the name of “Ms. Juk Khlong Sam”. Visually, it consistently utilizes a character from the popular Japanese Anime comic “One Piece” in its profile and cover photos.

Unlike many other influence operations, JUICYJAM can be considered as highly successful. Utilizing its visible views and engagement metrics as a proxy measure for influence, we can observe that the campaign enjoys:

  • Almost 110,000 followers on its X account, with tweet views often upwards of 15,000 (peaks of more than 50,000), and a consistent flow of likes, replies, and retweets.
  • A combined (non-unique) count of more than 133,000 followers on Facebook, divided between Pages (claimed to be non-official, as we will see, but reposting the X account’s same doxxing content), and a Group. An average post by one of the Facebook Pages typically achieved several hundred reactions, and dozens of comments.
  • The vast majority of that audience, and of the consequent engagement, appears to be authentic – i.e. generated by real users, rather than other accounts operated by JUICYJAM.
Figure 1. A doxxing post (archive) published by the Facebook Page “เจ๊จุก คลองสาม FC v.1”, sharing the location of a bakery owned by the sister of pro-democracy protester Panusaya Sithijirawattanakul and encouraging followers to leave a negative review. The post shows over 2,000 reactions, 144 comments, and almost 50 shares.

Timeline

We can observe JUICYJAM’s activity as far back as August 2020. At that time, two identical blogs were created on separate platforms – WordPress and Blogger, respectively – only days apart. On them, the previously unseen alias “Ms. Juk Khlong Sam” published two separate posts containing photos and private information – the veracity of which we could not verify – on two alleged members of the Thai protest movement. Some of the information being exposed included the names of the individuals’ family members; the schools they attended; or the name and location of the small businesses their families owned.

The blogs were no longer updated after the two posts were made. The persona, however, lived on.

On September 1, 2020, a Twitter (now X) account was created utilizing the same alias as the blogs: @jjookklong3. The profile for the first time displayed pictures of the “Big Mom” Anime character – which will remain a constant theme for the operation across its several years of activity.

Figure 2. Header of the @jjookklong3 X (Twitter) account, showing the “Big Mom” character from “One Piece” as the profile picture.

 

According to what is visible today, the account began posting approximately one week after its creation, on September 9, 2020. Its first known tweet (archive) described the account’s operator as a woman, disconcerted and indignant with the protest movement’s actions. The persona will be further built over the following years, as we will see later in this report.

Shortly after the publishing of the Twitter account, several assets utilizing the same (or very similar) naming convention, and an identical “Big Mom” visual theme, surfaced on Facebook.

  • The first, created in mid November 2020, was a Facebook Group called “เจ๊จุก คลองสาม Family” (Ms. Juk Khlong Sam Family).
    • The Group was set as private, but visible, meaning that we could observe the existence of the Group itself, as well as some other information related to it, but not its contents.
    • The Facebook Group in question utilized the same alias, and the same anime character, seen everywhere else until that moment.
    • On its Twitter/X account, “Ms. Juk Khlong Sam” repeatedly claimed ownership of the Facebook Group, even redirecting its followers to specific posts made within it.
    • The Group remains very active to this day, with approximately 13 posts made per day, according to the visible statistics.

 

Figure 3. The landing page for the Facebook Group “เจ๊จุก คลองสาม Family”, using the alias jjookklong3. The widget shows the creation date (November 12, 2020), as well as the privacy settings for the Group.

 

Figure 4. A screenshot (captured on April 4, 2025) of the “Activity” widget on the landing page for the Facebook Group “เจ๊จุก คลองสาม Family”, showing posts and users statistics.

 

Figure 5. A screenshot from a tweet (archive) in which @jjookklong3 redirects followers to the Facebook Group “เจ๊จุก คลองสาม Family” to watch a video attacking WeVo. The text translates to: “The full, long clip of the WeVo group’s arrogance is on the Facebook group ‘Jae Juk Khlong Sam Family’. Go watch it in full. Let me tell you, you’ll see every action and behavior. It’s like these drunk WeVo people can’t keep their cool.”

 

  • A few months after the Group, in March 2021, the first of several Facebook Pages (1, 2, 3, 4) using the same naming and visual patterns, and reposting the same content as the Twitter account, was published.
    • Unlike the Group, none of them were claimed by @jjookklong3 – at that point steadily at the epicenter of the campaign. In fact, the X profile even repudiated them on occasions, which apparently prompted the Pages’ administrators to explain that their intent was to further amplify the contents of the Twitter account over Facebook.
    • All Pages went inactive in 2021, except for one (เจ๊จุก คลองสาม FC v.1).

A broader set of social media accounts replicating the Twitter account’s and other existing profiles’ patterns was published in the subsequent years:

  • An Instagram account with two posts, which was linked to in the bio header of the @jjookklong3 Twitter account, allowing us to confirm it as affiliated.
  • A TikTok profile, with only one video posted.
  • A Telegram account – we were unable to review its posts.
  • A Threads profile with approximately 30 publicly visible posts.

On April 4, 2025, as we were preparing this report for publication, a new Facebook Page was created. For the first time, the X profile @jjookklong3 claimed it as its own, and asked its X audience to follow it. Given the limited available time, we did not conduct in-depth analysis of the Page’s activity.

Overall, the core of the activity for the operations appeared to rely on the X profile and the Facebook Group. However, the ostensibly “unofficial” (but evidently tolerated, at the very least) Facebook Pages effectively also acted as an amplifier for the same harassment and doxxing content posted on Twitter. The newly created “official” Facebook Page could now also acquire a prominent role in the campaign, showing it as fully active as of April 2025.

A Broader Ecosystem

While their analysis is out of scope for this report, we nonetheless note that JUICYJAM does not exist in isolation. We were able to identify several other social media entities covertly amplifying its contents, as well as producing their own.

Several of the social media handles revealed as operated by the Thai authorities in the March 2025 leak were also found to be reposting, or otherwise interacting with JUICYJAM.

Finally, we found at least one news channel consistently amplifying and propagating JUICYJAM’s doxxing posts, both on broadcast and social media.

Several signals had pointed us towards the assessment that “Ms. Juk Khlong Sam” was most likely an inauthentic persona.

  1. First, no piece of content ever posted by any of the JUICYJAM online assets contained verified identifiable information on the account’s owner. Claims that the operator owned a factory, that “she” was a middle-aged woman with a past in the protest movement herself, or that she had directly taken pictures of protesters – none of that could be confirmed through what the persona ever published.
  2. Secondly, a significant portion of the photographic and video footage included in the posts, as well as many of the personal details shared about the targets, could not reasonably have been sourced by a private individual. We show a few examples below.
Figure 6. A screenshot from a tweet (archive) posted by @jjookklong3 on December 31, 2020. In the text, the account operator claims to have “told my subordinates to take the video”. The recording happened in the middle of a riot police unit heading towards the suppression of a protest event.

 

Figure 7. Another example (tweet, archive) of a video taken from within a group of police officers – therefore, most likely by one of them, or an authorized partner – during a confrontation with demonstrators.

 

Figure 8. A Facebook post originally published by iLaw, a Thai civil society organization, which was re-shared and captioned by a target who was later doxxed in a blog post on jjookklong3.wordpress[.]com. The screenshot was used as evidence that the target insulted the monarchy. The post’s privacy settings (highlighted in red) show that it was originally only visible  to the target’s Facebook contacts. This denotes privileged access to the content by the JUICYJAM operators, either directly (for example, through the confiscation of a phone, or the planting of spyware on it), or via sources, such as a malicious or compromised contact who could view the post. 
Figure 9. A post doxxing a protestor published by the Facebook Page “เจ๊จุก คลองสาม FC” on August 15, 2021. The composite of photos includes private pictures; pictures from a demonstration; one Facebook post by the target person originally set to be only visible to friends (therefore, only accessible by the person’s approved contacts, or by an actor with privileged access – such as for example the military, or the police); and a picture from a work badge (as seen in this other post).

 

Based on the leaked documents, as well as circumstantial evidence we have collected during our research, we can now attribute JUICYJAM to the Royal Thai Armed Forces and/or the Royal Thai Police. Drawing from our observations – discussed in the following section – on the content type, behavioural patterns, and language utilized for JUICYJAM, however, we assess that this particular operation is more likely to be run by the Royal Thai Police. We detail the rationale behind our assessment further below.

Evidence from Leaked Documents

It is important to start by saying that the documents released to the public on March 25, 2025 show an alleged coordinated effort across multiple branches of the Thai military and police forces since at least 2023. JUICYJAM – active since 2020 – was probably merged into the broader coordinated effort when that was formed.

As summarized by the local news outlet Thai Enquirer, “documents from the army show that before the 2023 election, the military convened security meetings to analyze movements deemed anti-monarchy. This led to the creation of a “Special Security Task Force” coordinating operations across military branches.” Additionally, “the Cyber Team was established to coordinate efforts across agencies”, and “the IO structure was unified before the 2023 election”. The 2023 Thai general election happened on May 14, 2023.

 

Figure 10. The organizational chart of the “Cyber Team” leadership, created in 2023 to coordinate the influence operations efforts by the Thai government, as shown on one of the leaked documents (คณะทำงาน ความมั่นคงพิเศษ ทบ Cyber team.pdf). The column at the right end identifies police officials – marked by red boxes – while the other columns show military officials. The picture was posted by the X account for Thai Enquirer at this address (archive).

 

In this context, we could identify at least two leaked presentations intended to demonstrate the Cyber Team’s tactics to an internal audience. As part of that demonstration, the two documents show a total of five tweets that we can prove were published by the Twitter (X) account @jjookklong3.

The files are titled “Our Strategy August 67” (ยุทธศาสตร์ฝ่ายเรา สิงหาคม 67.pdf) and “Our Strategy October 67” (ยุทธศาสตร์ฝ่ายเรา ตุลาคม 67.pdf), respectively.

The slides present the tweets by @jjookklong3 – whose handle, as previously mentioned, is redacted – as tactical responses deployed to suppress protest narratives perceived as threatening for the establishment.

The first example showed how @jjookklong3 was utilized to counter a specific protest narrative. The narrative was popularized in response to the arrest and conviction of Jatuporn Sae-ung, an activist whose doxxing we address later on in this report. 

In the leaked slides provided below, @jjookklong3 was employed by the ‘Cyber Team’ to counteract the protest narrative through two common IO methods:

  1. Distraction: moving the focus of its audience towards a more defensible argument than the one for which the target was arrested and charged;
  2. Smear: discrediting the target by suggesting they were associated with a given person or group (in the example provided, a now disbanded political party in the Thai opposition). 
Figure 11. A slide on page 33 of the leaked document “ยุทธศาสตร์ฝ่ายเรา สิงหาคม 67.pdf” (Our Strategy August 67.pdf), titled “Countering the distorted narrative: ‘Just wearing traditional Thai costume could get you charged under Section 112’”. The two screenshots presented are taken from tweets by @jjookklong3, originally posted here (archive) and here (archive).

 

Figure 12. A screenshot from the original tweet by @jjookklong3 shown on the left half of the leaked presentation slide, highlighting a photo captioned:“Love the remix of the Royal Guards March on the background”. The caption on the  post by @jjookklong3 states: “It was not simply about wearing a traditional Thai costume. Whoever thinks this is not wrong, just come out and wear the costume. Do you dare to do that?”

 

Figure 13. A screenshot from the original tweet by @jjookklong3 shown on the right half of the leaked presentation slide, with a caption stating “The organisers of the protest prepared everything from the theme, scene, actors, and banners. Anybody who sees this can immediately understand what their intention was. It is not simply wearing a traditional Thai costume.”

 

Figure 14. A slide on page 18 of the leaked document “ยุทธศาสตร์ฝ่ายเรา สิงหาคม 67.pdf” (Our Strategy August 67.pdf), titled “Linking “New” Jatuporn Sae-ung to the Move Forward Party Leaders.”

 

Figure 15. A screenshot from the original tweet by @jjookklong3 shown on the left half of the leaked presentation slide at page 18, with a caption stating: “Wearing a traditional Thai costume does not get you a lèse-majesté charge. So good at lying. You do not need to look so far to the Arun Temple. Just look at those who are close to you who wear traditional Thai costumes and do not get the charge. Stop lying to the people. #Supporting112 #MustEndUpInJail”. The tweet was originally posted here (archive).

 

In addition to the examples shown above, within the leaked slides we could also identify:

  • The targeted response to the publication of a book by an academic professor – Puangthong Pawakapan – critical of the military rule (document titled: “ยุทธศาสตร์ฝ่ายเรา ตุลาคม 67.pdf”, page 5. Original tweet posted here, and archived here). The slide also illustrates the coordinated use of the hashtag #ในนามความมั่นคงภายใน (“#InTheNameOfInternalSecurity”).
  • The deliberate framing of a protest leader – Panupong “Mike Rayong” Jadnok – as “living a comfortable life”, in an apparent attempt to discredit him in the eyes of his supporters (document titled: ยุทธศาสตร์ฝ่ายเรา ตุลาคม 67.pdf, page 4. Original tweets posted here and here; archived here and here).
  • A mocking, derogatory response to requests for an amnesty towards the protesters imprisoned under the Section 112 of the Thai Criminal Code (Lèse-majesté). (Document titled: ยุทธศาสตร์ฝ่ายเรา ตุลาคม 67.pdf, page 5. Original tweet posted here (archive)).

The reproduction, verbatim, of tweets by @jjookklong3 in the context of regular internal reports on the IO tactics deployed by the interforce “cyber team” has no other plausible explanation than the fact that the account – and therefore the entire campaign – was run by the Cyber Team itself.

As for the specific branch responsible for creating and operating JUICYJAM, we cannot reach a definitive conclusion. However, we do note circumstantial evidence that this particular IO could be conducted by the Royal Thai Police. For example:

  • In the mentioned 2020 influence operation attributed to the Royal Thai Army by X, formerly Twitter, the tweets made available by the platform showed an insisted focus on promoting the Royal Thai Army and attacking individual protesters.
  • A qualitative comparison of the language used by the 2020 IO and @jjookklong3 shows a clear difference. @jjookklong3’s focus is on targeting individual protesters, calling for their arrest, and promoting the Royal Thai Police.
  • As mentioned before, several pieces of photographic and video content posted by @jjookklong3 – and the connected social media and blogging handles – appear to have been either captured or likely acquired by the Royal Thai Police.

Like comparable influence operations designed to quash protest movements and prop autocratic regimes, it is critical to consider the real-life implications of JUICYJAM. Similarly to what we had highlighted in the context of the 2020-2021 pro-democracy protests in Hong Kong – see our report on the “HKLEAKS” campaign – the Thai actors appear to maximize their impact through the concurrent action of smear campaigns, intimidation, illegal assaults, and judicial harassment.

We identified a pattern that linked the doxxing and online harassment of individual protesters by @jjookklong3 to their arbitrary detention, and subsequent charging, by the local authorities. On some occasions, the targets have also been assaulted by unidentified masked gangs before their arrest.

The modus operandi utilized the following methods:

View footnotes and 

The ultimate goal of following up doxxing with judicial harassment – a process that has been documented in previous research – is to reduce the target to silence and inaction, if not exile, through the combined power of covert and overt repression.

A few examples of the impact of these combined methods include:

  • Jatuporn Sae-ung (จตุพร แซ่อึง), also known as “New”
    • Jatuporn Sae-ung was at the centre of the @jjookklong3 tweets we observed as part of the leaked documents allowing us to attribute the campaign to the Thai authorities. She was accused by JUICYJAM of having mocked the Monarchy – a crime punishable under the lèse-majesté law, also known as Section 112 – for wearing a traditional Thai costume at a protest demonstration.
    • The JUICYJAM action was twofold: it doxxed and belittled Jatuporn (tweet here) and the protesters (here) in regards to the traditional costume, and to the related protest; and it sought to link her to the now-defunct opposition Move Forward Party (here). Two of these tweets were shown in the leaked presentation slides promoting the “Cyber Team” actions internally, as seen in the previous sections.
    • In September 2022, Jatuporn was sentenced to three years in prison for mocking Queen Suthida, and temporarily released on bail.
  • Itthikorn Sapchang (อิทธิกร ทรัพย์แฉ่ง)
    • Itthikorn Sapchang participated in several events organized by the Free YOUTH (เยาวชนปลดแอก) movement, one of most active protest groups. 
    • On March 20, 2021, he joined a demonstration dubbed REDEM, which was organized by Free YOUTH and the Democracy Restoration Group (DRG) in Bangkok. 
    • Later on the same night, he was assaulted and brutally beaten by an unidentified group dressed in black. According to a Facebook post published by a friend of his, he was beaten with steel batons, and “suffered a cracked head, a cracked cheek, and a cracked lip. He required 14 stitches in total. The doctor said it affected nerves and could cause disability, and he needed to be closely monitored.”
    • A photo published on the same Facebook post showed the outcome of the attack [WARNING: graphic picture – click to view]
      Figure 16. [Graphic content warning – click image to view] A photo of of Itthikorn Sapchang lying on the ground immediately after the assault he suffered on March 20, 2021, following his participation in a protest in Bangkok. Originally posted here.
    • The Royal Thai Police claimed that they could not identify the perpetrators, as they alleged that every CCTV camera in the area was broken – as claimed in the same Facebook post.
    • On May 2, 2021, after Itthikorn had joined another REDEM demonstration on that same day, @jjookklong3 posted (archive) photos of a man strongly resembling him, although his face was covered by a motorbike helmet. It asked its followers: “guess who [is it]?”
      • We note that the man shown in the photos has a similar build as Itthikorn, as well as similar clothing to the one he wore when he was assaulted on March 20, 2021.
    • Eventually, on May 14, 2021, he was charged with “gathering in groups of 10 or more people, using violence to cause chaos in the country, where one of the offenders is armed; when an official orders the gathering to stop and the offenders do not stop; gathering in violation of the Emergency Decree and the Communicable Disease Act; contempt of court or judges during a hearing; using a loudspeaker without permission; and obstructing the sidewalk in violation of the Traffic Act and the Cleanliness Act.”
  • Weeraphab Wongsaman (วีรภาพ วงษ์สมาน), also known as “Rev’’
    • The protester nicknamed “Rev” was doxxed by @jjookklong3 on March 26, 2021, after he allegedly participated in the mentioned March 20th REDEM protest. Rev became a frequent target of @jjookklong3, identifying him in protest images from May, July, August, and September 2021.
    • On May 14, 2021, he was arrested for participating in the May 2 REDEM rally and released on bail. 
    • On September 15, 2021, he was arrested for his alleged participation in the September 13 Din Daeng protest and held in pre-trial detention at the Bangkok Remand Prison. 
    • On October 29, 2021, “Rev” and another activist, Auttasit Nussa, were dragged and beaten by the police while they were in custody at the Din Daeng Police Station.
    • In November 2021, “Rev” and Auttasit filed a complaint against the police at the Din Daeng police station, and later at the Department of Special Investigation (DSI). Despite requesting CCTV footage of the incident, the police refused to give it to them. The investigation was eventually closed, as the Torture Sub-committee determined that the beating did not constitute torture.
    • On September 28, 2023, he was sentenced to three years in prison for lèse-majesté. He remains in prison since then after having been denied multiple bail requests.

Key Factors

  • The notion of doxxing is only sparsely captured within the policies of the main social media platforms.  It is therefore difficult for an external reader to conclusively identify the rules and actions that the platforms promise to enact in response to its deployment.
  • Moreover, as doxxing is typically framed merely as a privacy violation, the platforms’ policies do not expressly consider its use by adversarial coordinated actors, particularly in the context of state repression.
  • Additionally, our analysis of JUICYJAM’s history shows that even when doxxing is specifically mentioned in policies, the related prohibitions are inconsistently enforced on.

Reviewing the Policies on Doxxing for X and Meta

In the current version of their Private Information policy (last updated in March 2024), X states: 

“You may not threaten to expose, incentivize others to expose, or publish or post other people’s private information without their express authorization and permission, or share private media of individuals without their consent.  

Sharing someone’s private information online without their permission, sometimes called “doxxing,” is a breach of their privacy and can pose serious safety and security risks for those affected.”

While JUICYJAM did primarily post pictures and videos taken at public demonstrations, it very frequently enriched them with private information and footage, including in certain cases government IDs and other official documents – which would most definitely qualify as “a breach of [the targets’] privacy” and posing “serious safety and security risks for those affected”. The continued, and highly prominent, activity and existence of the @jjookklong3 account therefore appears to be a clear failure in this policy’s enforcement by the platform.

Additionally:

  • Platforms’ policies on doxxing seldom consider the behaviour in the context of coordinated – and often state-sponsored – campaigns against civil society, where the great imbalance of power between attackers and targets exponentially increases their harm, as we have seen in this report. 
  • They also do not consider environmental factors, such as the doxxing happening during unrest and protests.

In 2022, these issues were addressed in a set of 17 recommendations made to Meta by the Oversight Board  in response to a request for a policy advisory opinion on “Sharing Private Residential Information”. Recommendations 11 and 12 are especially relevant to the case of JUICYJAM:

Recommendation
Details
Private Residential Info Policy Advisory Opinion – Recommendation #11 Meta should create a specific channel of communications for victims of doxing (available both for users and non-users). Additionally, Meta could provide financial support to organizations that already have hotlines in place. Meta should prioritize action when the impacted person references belonging to a group facing heightened risk to safety in the region where the private residence is located. The Board will consider this implemented when Meta creates the channel and publicly announces how to use it.
Private Residential Info Policy Advisory Opinion – Recommendation #12 Meta should consider the violation of its Privacy Violations policy as “severe,” prompting temporary account suspension, in cases where the sharing of private residential information is clearly related to malicious action that created a risk of violence or harassment. The Board will consider this implemented when Meta updates its Transparency Center description of the strikes system to make clear that some Privacy Violations are severe and may result in account suspension.

Table 1. Recommendations 11 and 12 as provided by the Oversight Board to Meta. Excerpt from the full list of 17 recommendations provided in response to the company’s request for a policy advisory opinion on its “Sharing Private Residential Information” policy.

The Oversight Board’s recommendations – unlike decisions – are not binding. Neither of these recommendations were implemented by Meta at the time of publication of this report. 

  • Recommendation 11 was blocked (“no further action”), with Meta deferring its intended purposes to the existing partnership with “850 safety partners globally, including helplines and organisations that work with victims of harassment, online and offline”.
  • Recommendation 12 was initially labeled with “assessing feasibility”, stating that “to assess the board’s recommendation, we will first need to determine how to identify when sharing private residential information ‘is clearly related to malicious action that created a risk of violence or harassment’ and how we can log this type of information in our system.” However, the most recent update was shown to have happened on June 12, 2023. 
    • We note that in the complete list of recommendations provided by the Oversight Board to Meta, Recommendation 12 on “Sharing Private Information” is also labelled as “no further action” and “no further updates”, signalling that the company has eventually decided not to implement it.

As shown before in this report , JUICYJAM’s inauthentic persona, and its doxxing and harassing content, continues to be visible – and highly reachable – on at least four Facebook Pages, one Facebook Group, one Instagram account, and one Threads account as of April 2025.

Finally, successes in enforcing policies against coordinated doxxing do happen, occasionally. In June 2021, shortly before JUICYJAM started, Google removed two custom Google Maps that “had listed the names and addresses of hundreds of Thai activists who were accused by royalists of opposing the monarchy”. The maps had been published by a team coordinated by Songklod “Pukem” Chuenchoopol, a prominent pro-monarchy activist, with the intention of reporting everyone named to the police for lèse-majesté. We also noticed that the hashtag #CaptainPooKhem – commonly used by his supporters to amplify his posts – appears to be blocked on Facebook, returning no results. It remains however possible to post it, as can be seen on existing posts.

Government-operated doxxing campaigns are potent tools of repression, and it is no accident that they are often targeted against peaceful pro-democracy movements.  Critically, whether in Hong Kong, Thailand, or elsewhere, governments and their proxies often deploy them to complement and enhance more traditional forms of state repression, like violence and deprivation of liberty.

In the case of JUICYJAM, for example, targets of the campaign were also detained, charged, and often physically assaulted. The harm can be devastating. 

Low Risk, High Reward

While JUICYJAM was ostensibly the work of a fictitious persona, the campaign was fueled with information and content only available to government entities. The veil of plausible deniability it offered to them was sufficient for the campaign to thrive for several years before being exposed as linked to the Thai authorities. There is also no guarantee that it will stop now.

In the conclusions to our report on the HKLEAKS influence operation – which, as we have seen, followed the same general playbook as JUICYJAM – we had stated: “If digital repression is about raising the cost of activism, then the HKLEAKS case suggests that doxxing can be a fairly low risk but potentially high reward instrument of digital repression.”

Despite the extremely serious harms for the targets of doxxing campaigns, this statement continues to be accurate.

Coordinated Government-Backed Doxxing: Likely to Grow

JUICYJAM’s five-year-and-counting run in Thailand without serious disruption shows that the current tools, attention, and approach to this problem were largely insufficient to mitigate the harm caused to peaceful protesters and activists. 

Social media companies frame their limited action on doxxing as a necessary balance of freedom of expression and safety (and the difficulties of determining public vs. private information) . However, repressive states specifically deploy coordinated doxxing as a technique to punish authentic freedom of expression and threaten safety. Today, most major social media platforms are moving towards reducing, gutting, and eliminating programs originally aimed at increasing ecosystem safety and health initiatives.  Campaigns like JUICYJAM are likely to become more common as states learn from each other and operate in an increasingly permissive environment on certain platforms. The playbook stands to be repeated on a potentially global scale in a world that is seeing a continued trend of democratic decline.

On April 9, 2025, we sent emails to Meta and X with questions and recommendations to address the concerns raised by our work. At the time of publication, we had not received a response from X. While Meta acknowledged receipt, they did not answer our questions.

Our recommendations to X and Meta include:

  1. Provide an easily accessible and responsive way (i.e. a hotline) for victims of doxxing to report the malicious public sharing of their private content. The content should be quickly removed after Meta and X verified it as the product of doxxing.
  2. Implement instruments for Meta and X to identify, and remove, networks acting in a coordinated manner to conduct doxxing. The action should not only consist in the removal of individual pieces of content, but in the simultaneous removal, permanent ban, and subsequent monitoring of the networked actors responsible for the malicious activity.
  3. Develop and implement instruments for the protection of civil society from doxxing through Meta’s and X’s platforms in hybrid and authoritarian regimes according to The Economist Democracy Index, or Partly Free and Not Free countries according Freedom House’s Freedom in the World survey. Such instruments should include appropriate solutions on both the policy and the technological side.
  4. Conduct an audit on the existence and activity of potential coordinated doxxing networks, with priority on illiberal countries as defined per point above. Implement a coordinated removal of the networks confirmed as conducting doxxing. Publicly disclose proven cases of state-sponsored doxxing networks.

We would like to thank Rebekah Brown and Siena Anstis, for peer reviewing this report. Special thanks to Adam Senft and Alyson Bruce.

Research for this project was supervised by Ronald Deibert.

 

Selector Type Platform
jjookklong3.wordpress[.]com Blog WordPress
jjookklong3.blogspot[.]com Blog Blogspot
https://www.facebook.com/jjookklong3 FB Page Facebook
https://www.facebook.com/jjookklong3v1/ FB Page Facebook
https://www.facebook.com/jjookklong3v2 FB Page Facebook
https://www.facebook.com/jjook.klongsam FB Page Facebook
https://www.facebook.com/profile.php?id=100064600722544 FB Page Facebook
https://www.facebook.com/groups/jjookklong3/ FB Group Facebook
https://www.facebook.com/profile.php?id=100066932562498 FB Profile (admin of the FB Group) Facebook
https://www.facebook.com/profile.php?id=100061845026654 FB Profile (admin of the FB Group) Facebook
https://www.facebook.com/mam.bunyaporn.9 FB Profile (admin of the FB Group) Facebook
https://www.facebook.com/ce.cuk.khlxng.sam FB Profile (admin of the FB Group) Facebook
https://www.facebook.com/profile.php?id=100060925375093 FB Profile (admin of the FB Group) Facebook
instagram.com/jjook_klong3/ Instagram account Instagram
https://www.threads.net/@jjook_klong3 Threads account Threads
https://x.com/jjookklong3 X account X
https://www.tiktok.com/@jjook_klong3 TikTok account TikTok
[email protected] Email address Gmail
https://t.me/jjookklong3 Telegram user Telegram
jjookad WordPress author WordPress
https://www.blogger.com/profile/14058024983323444123 Blogger profile Blogger/Blogspot

 

Related Posts

Leave a Comment