Similar Items: A general method for real-time detection of information threats with a Ukraine case study