Text this: A general method for real-time detection of information threats with a Ukraine case study