Head of Product at X also changed narratives in real-time, going from "this was never shown" for gray accounts like the DHS', to saying the feature was disabled due to incorrect information from IP ranges changing over time - when you're literally just checking their first IP check-in:
And there was, to everyone's credit, DOZENS of X threads of people torture-testing their browser recordings to confirm whether the information was legit or not:
Maybe THAT screenshot was, but it's not looking good that the information in that screenshot (doctored or not) wasn't exposed.
Also fotoforensics is irrelevant, take a screenshot of an X account's information and you see those black bars. Why would they doctor the "@DHSgov" username otherwise lol?
The same head of product quoted in the sib comment admits that "for a small set of accounts the location data was incorrect". Given what we know about Twitter's relationship with the government and this administration in particular, you're simply left to do with that information what you will.
I personally do not trust Twitter, or the government, very much. I also would not be surprised if some government accounts were created at various embassies around the world or through strategic VPN networks, or if general business is conducted through a darknet-like node system which includes allied endpoints. To me those are more plausible.