mirror of
https://github.com/DISARMFoundation/DISARMframeworks.git
synced 2024-12-18 12:24:25 -05:00
783 lines
24 KiB
Markdown
783 lines
24 KiB
Markdown
|
# DISARM Detections:
|
|||
|
|
|||
|
<table border="1">
|
|||
|
<tr>
|
|||
|
<th>disarm_id</th>
|
|||
|
<th>name</th>
|
|||
|
<th>summary</th>
|
|||
|
<th>metatechnique</th>
|
|||
|
<th>tactic</th>
|
|||
|
<th>responsetype</th>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00001.md">F00001</a></td>
|
|||
|
<td>Analyse aborted / failed campaigns</td>
|
|||
|
<td>Examine failed campaigns. How did they fail? Can we create useful activities that increase these failures? </td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00002.md">F00002</a></td>
|
|||
|
<td>Analyse viral fizzle</td>
|
|||
|
<td>We have no idea what this means. Is it something to do with the way a viral story spreads? </td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00003.md">F00003</a></td>
|
|||
|
<td>Exploit counter-intelligence vs bad actors</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00004.md">F00004</a></td>
|
|||
|
<td>Recruit like-minded converts "people who used to be in-group" </td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00005.md">F00005</a></td>
|
|||
|
<td>SWOT Analysis of Cognition in Various Groups</td>
|
|||
|
<td>Strengths, Weaknesses, Opportunities, Threats analysis of groups and audience segments. </td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00006.md">F00006</a></td>
|
|||
|
<td>SWOT analysis of tech platforms</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00007.md">F00007</a></td>
|
|||
|
<td>Monitor account level activity in social networks</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA02 Objective Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00008.md">F00008</a></td>
|
|||
|
<td>Detect abnormal amplification</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00009.md">F00009</a></td>
|
|||
|
<td>Detect abnormal events</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00010.md">F00010</a></td>
|
|||
|
<td>Detect abnormal groups</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00011.md">F00011</a></td>
|
|||
|
<td>Detect abnormal pages</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00012.md">F00012</a></td>
|
|||
|
<td>Detect abnormal profiles, e.g. prolific pages/ groups/ people</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00013.md">F00013</a></td>
|
|||
|
<td>Identify fake news sites</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00014.md">F00014</a></td>
|
|||
|
<td>Trace connections</td>
|
|||
|
<td>for e.g. fake news sites</td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00015.md">F00015</a></td>
|
|||
|
<td>Detect anomalies in membership growth patterns</td>
|
|||
|
<td>I include Fake Experts as they may use funding campaigns such as Patreon to fund their operations and so these should be watched.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00016.md">F00016</a></td>
|
|||
|
<td>Identify fence-sitters</td>
|
|||
|
<td>Note: In each case, depending on the platform there may be a way to identify a fence-sitter. For example, online polls may have a neutral option or a "somewhat this-or-that" option, and may reveal who voted for that to all visitors. This information could be of use to data analysts.
|
|||
|
|
|||
|
In TA08-11, the engagement level of victims could be identified to detect and respond to increasing engagement.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00017.md">F00017</a></td>
|
|||
|
<td>Measure emotional valence</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00018.md">F00018</a></td>
|
|||
|
<td>Follow the money</td>
|
|||
|
<td>track funding sources</td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00019.md">F00019</a></td>
|
|||
|
<td>Activity resurgence detection (alarm when dormant accounts become activated)</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA04 Develop Networks</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00020.md">F00020</a></td>
|
|||
|
<td>Detect anomalous activity</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA04 Develop Networks</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00021.md">F00021</a></td>
|
|||
|
<td>AI/ML automated early detection of campaign planning</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA04 Develop Networks</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00022.md">F00022</a></td>
|
|||
|
<td>Digital authority - regulating body (united states)</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA04 Develop Networks</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00023.md">F00023</a></td>
|
|||
|
<td>Periodic verification (counter to hijack legitimate account)</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA04 Develop Networks</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00024.md">F00024</a></td>
|
|||
|
<td>Teach civics to kids/ adults/ seniors</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA04 Develop Networks</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00025.md">F00025</a></td>
|
|||
|
<td>Boots-on-the-ground early narrative detection</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA05 Microtargeting</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00026.md">F00026</a></td>
|
|||
|
<td>Language anomoly detection</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA05 Microtargeting</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00027.md">F00027</a></td>
|
|||
|
<td>Unlikely correlation of sentiment on same topics</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA05 Microtargeting</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00028.md">F00028</a></td>
|
|||
|
<td>Associate a public key signature with government documents</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00029.md">F00029</a></td>
|
|||
|
<td>Detect proto narratives, i.e. RT, Sputnik</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00030.md">F00030</a></td>
|
|||
|
<td>Early detection and warning - reporting of suspect content</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00031.md">F00031</a></td>
|
|||
|
<td>Educate on how to identify information pollution</td>
|
|||
|
<td>Strategic planning included as innoculating population has strategic value.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00032.md">F00032</a></td>
|
|||
|
<td>Educate on how to identify to pollution</td>
|
|||
|
<td>DUPLICATE - DELETE </td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00033.md">F00033</a></td>
|
|||
|
<td>Fake websites: add transparency on business model</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00034.md">F00034</a></td>
|
|||
|
<td>Flag the information spaces so people know about active flooding effort</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00035.md">F00035</a></td>
|
|||
|
<td>Identify repeated narrative DNA</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00036.md">F00036</a></td>
|
|||
|
<td>Looking for AB testing in unregulated channels</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00037.md">F00037</a></td>
|
|||
|
<td>News content provenance certification. </td>
|
|||
|
<td>Original Comment: Shortcomings: intentional falsehood. Doesn't solve accuracy. Can't be mandatory.
|
|||
|
|
|||
|
Technique should be in terms of "strategic innoculation", raising the standards of what people expect in terms of evidence when consuming news.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00038.md">F00038</a></td>
|
|||
|
<td>Social capital as attack vector</td>
|
|||
|
<td>Unsure I understood the original intention or what it applied to. Therefore the techniques listed (10, 39, 43, 57, 61) are under my interpretation - which is that we want to track ignorant agents who fall into the enemy's trap and show a cost to financing/reposting/helping the adversary via public shaming or other means.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00039.md">F00039</a></td>
|
|||
|
<td>standards to track image/ video deep fakes - industry</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00040.md">F00040</a></td>
|
|||
|
<td>Unalterable metadata signature on origins of image and provenance</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA06 Develop Content</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00041.md">F00041</a></td>
|
|||
|
<td>Bias detection</td>
|
|||
|
<td>Not technically left of boom</td>
|
|||
|
<td></td>
|
|||
|
<td>TA07 Channel Selection</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00042.md">F00042</a></td>
|
|||
|
<td>Categorize polls by intent</td>
|
|||
|
<td>Use T00029, but against the creators</td>
|
|||
|
<td></td>
|
|||
|
<td>TA07 Channel Selection</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00043.md">F00043</a></td>
|
|||
|
<td>Monitor for creation of fake known personas</td>
|
|||
|
<td>Platform companies and some information security companies (e.g. ZeroFox) do this. </td>
|
|||
|
<td></td>
|
|||
|
<td>TA07 Channel Selection</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00044.md">F00044</a></td>
|
|||
|
<td>Forensic analysis</td>
|
|||
|
<td>Can be used in all phases for all techniques.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA08 Pump Priming</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00045.md">F00045</a></td>
|
|||
|
<td>Forensic linguistic analysis</td>
|
|||
|
<td>Can be used in all phases for all techniques.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA08 Pump Priming</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00046.md">F00046</a></td>
|
|||
|
<td>Pump priming analytics</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA08 Pump Priming</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00047.md">F00047</a></td>
|
|||
|
<td>trace involved parties</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA08 Pump Priming</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00048.md">F00048</a></td>
|
|||
|
<td>Trace known operations and connection</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA08 Pump Priming</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00049.md">F00049</a></td>
|
|||
|
<td>trace money</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA08 Pump Priming</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00050.md">F00050</a></td>
|
|||
|
<td>Web cache analytics</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA08 Pump Priming</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00051.md">F00051</a></td>
|
|||
|
<td>Challenge expertise</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00052.md">F00052</a></td>
|
|||
|
<td>Discover sponsors</td>
|
|||
|
<td>Discovering the sponsors behind a campaign, narrative, bot, a set of accounts, or a social media comment, or anything else is useful.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00053.md">F00053</a></td>
|
|||
|
<td>Government rumour control office (what can we learn?)</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00054.md">F00054</a></td>
|
|||
|
<td>Restrict people who can @ you on social networks</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00055.md">F00055</a></td>
|
|||
|
<td>Verify credentials</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00056.md">F00056</a></td>
|
|||
|
<td>Verify organisation legitimacy</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00057.md">F00057</a></td>
|
|||
|
<td>Verify personal credentials of experts</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00058.md">F00058</a></td>
|
|||
|
<td>Deplatform (cancel culture)</td>
|
|||
|
<td>*Deplatform People: This technique needs to be a bit more specific to distinguish it from "account removal" or DDOS and other techniques that get more specific when applied to content.
|
|||
|
|
|||
|
For example, other ways of deplatforming people include attacking their sources of funds, their allies, their followers, etc.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA10 Go Physical</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00059.md">F00059</a></td>
|
|||
|
<td>Identify susceptible demographics</td>
|
|||
|
<td>All techniques provide or are susceptible to being countered by, or leveraged for, knowledge about user demographics.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA10 Go Physical</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00060.md">F00060</a></td>
|
|||
|
<td>Identify susceptible influencers</td>
|
|||
|
<td>I assume this was a transcript error. Otherwise, "Identify Susceptible Influences" as in the various methods of influences that may work against a victim could also be a technique. Nope, wasn't a transcript error: original note says influencers, as in find people of influence that might be targetted. </td>
|
|||
|
<td></td>
|
|||
|
<td>TA10 Go Physical</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00061.md">F00061</a></td>
|
|||
|
<td>Microtargeting</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA10 Go Physical</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00062.md">F00062</a></td>
|
|||
|
<td>Detect when Dormant account turns active</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA11 Persistence</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00063.md">F00063</a></td>
|
|||
|
<td>Linguistic change analysis</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA11 Persistence</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00064.md">F00064</a></td>
|
|||
|
<td>Monitor reports of account takeover</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA11 Persistence</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00065.md">F00065</a></td>
|
|||
|
<td>Sentiment change analysis</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA11 Persistence</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00066.md">F00066</a></td>
|
|||
|
<td>Use language errors, time to respond to account bans and lawsuits, to indicate capabilities</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA11 Persistence</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00067.md">F00067</a></td>
|
|||
|
<td>Data forensics</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00068.md">F00068</a></td>
|
|||
|
<td>Resonance analysis</td>
|
|||
|
<td>a developing methodology for identifying statistical differences in how social groups use language and quantifying how common those statistical differences are within a larger population. In essence, it hypothesizes how much affinity might exist for a specific group within a general population, based on the language its members employ</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00069.md">F00069</a></td>
|
|||
|
<td>Track Russian media and develop analytic methods.</td>
|
|||
|
<td>To effectively counter Russian propaganda, it will be critical to track Russian influence efforts. The information requirements are varied and include the following: • Identify fake-news stories and their sources. • Understand narrative themes and content that pervade various Russian media sources. • Understand the broader Russian strategy that underlies tactical propaganda messaging.</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00070.md">F00070</a></td>
|
|||
|
<td>Full spectrum analytics</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>ALL</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00071.md">F00071</a></td>
|
|||
|
<td>Network analysis Identify/cultivate/support influencers</td>
|
|||
|
<td>Local influencers detected via Twitter networks are likely local influencers in other online and off-line channels as well. In addition, the content and themes gleaned from Russia and Russia-supporting populations, as well as anti-Russia activists, likely swirl in other online and off-line mediums as well.</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00072.md">F00072</a></td>
|
|||
|
<td>network analysis to identify central users in the pro-Russia activist community.</td>
|
|||
|
<td>It is possible that some of these are bots or trolls and could be flagged for suspension for violating Twitter’s terms of service.</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00073.md">F00073</a></td>
|
|||
|
<td>collect intel/recon on black/covert content creators/manipulators</td>
|
|||
|
<td>Players at the level of covert attribution, referred to as “black” in the grayscale of deniability, produce content on user-generated media, such as YouTube, but also add fear-mongering commentary to and amplify content produced by others and supply exploitable content to data dump websites. These activities are conducted by a network of trolls, bots, honeypots, and hackers. </td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00074.md">F00074</a></td>
|
|||
|
<td>identify relevant fence-sitter communities</td>
|
|||
|
<td>brand ambassador programs could be used with influencers across a variety of social media channels. It could also target other prominent experts, such as academics, business leaders, and other potentially prominent people. Authorities must ultimately take care in implementing such a program given the risk that contact with U.S. or NATO authorities might damage influencer reputations. Engagements must consequently be made with care, and, if possible, government interlocutors should work through local NGOs.</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00075.md">F00075</a></td>
|
|||
|
<td>leverage open-source information</td>
|
|||
|
<td>significant amounts of quality open-source information are now available and should be leveraged to build products and analysis prior to problem prioritization in the areas of observation, attribution, and intent. Successfully distinguishing the gray zone campaign signal through the global noise requires action through the entirety of the national security community. Policy, process, and tools must all adapt and evolve to detect, discern, and act upon a new type of signal</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00076.md">F00076</a></td>
|
|||
|
<td>Monitor/collect audience engagement data connected to “useful idiots”</td>
|
|||
|
<td>Target audience connected to "useful idiots rather than the specific profiles because - The active presence of such sources complicates targeting of Russian propaganda, given that it is often difficult to discriminate between authentic views and opinions on the internet and those disseminated by the Russian state.
|
|||
|
</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00077.md">F00077</a></td>
|
|||
|
<td>Model for bot account behavior</td>
|
|||
|
<td>Bot account: action based, people. Unsure which DISARM techniques.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00078.md">F00078</a></td>
|
|||
|
<td>Monitor account level activity in social networks</td>
|
|||
|
<td>All techniques benefit from careful analysis and monitoring of activities on social network.</td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00079.md">F00079</a></td>
|
|||
|
<td>Network anomaly detection</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA05 Microtargeting</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00080.md">F00080</a></td>
|
|||
|
<td>Hack the polls/ content yourself</td>
|
|||
|
<td>Two wrongs don't make a right? But if you hack your own polls, you do learn how it could be done, and learn what to look for</td>
|
|||
|
<td></td>
|
|||
|
<td>TA07 Channel Selection</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00081.md">F00081</a></td>
|
|||
|
<td>Need way for end user to report operations</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00082.md">F00082</a></td>
|
|||
|
<td>Control the US "slang" translation boards</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA11 Persistence</td>
|
|||
|
<td>D03</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00083.md">F00083</a></td>
|
|||
|
<td>Build and own meme generator, then track and watermark contents</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA11 Persistence</td>
|
|||
|
<td>D05</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00084.md">F00084</a></td>
|
|||
|
<td>Track individual bad actors</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00085.md">F00085</a></td>
|
|||
|
<td>detection of a weak signal through global noise</td>
|
|||
|
<td>Gray zone threats are challenging given that warning requires detection of a weak signal through global noise and across threat vectors and regional boundaries.Three interconnected gray zone elements characterize the nature of the activity:
|
|||
|
Temporality: The nature of gray zone threats truly requires a “big picture view” over long timescales and across regions and functional topics.
|
|||
|
Attribution: requiring an “almost certain” or “nearly certain analytic assessment before acting costs time and analytic effort
|
|||
|
Intent: judgement of adversarial intent to conduct gray zone activity. Indeed, the purpose of countering gray zone threats is to deter adversaries from fulfilling their intent to act. While attribution is one piece of the puzzle, closing the space around intent often means synthesizing multiple relevant indicators and warnings, including the state’s geopolitical ambitions, military ties, trade and investment, level of corruption, and media landscape, among others.</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00086.md">F00086</a></td>
|
|||
|
<td>Outpace Competitor Intelligence Capabilities</td>
|
|||
|
<td>Develop an intelligence-based understanding of foreign actors’ motivations, psychologies, and societal and geopolitical contexts. Leverage artificial intelligence to identify patterns and infer competitors’ intent</td>
|
|||
|
<td></td>
|
|||
|
<td>TA02 Objective planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00087.md">F00087</a></td>
|
|||
|
<td>Improve Indications and Warning</td>
|
|||
|
<td>United States has not adequately adapted its information indicators and thresholds for warning policymakers to account for gray zone tactics. Competitors have undertaken a marked shift to slow-burn, deceptive, non-military, and indirect challenges to U.S. interests. Relative to traditional security indicators and warnings, these are more numerous and harder to detect and make it difficult for analysts to infer intent.</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00088.md">F00088</a></td>
|
|||
|
<td>Revitalize an “active measures working group,”</td>
|
|||
|
<td>Recognize campaigns from weak signals, including rivals’ intent, capability, impact, interactive effects, and impact on U.S. interests... focus on adversarial covert action aspects of campaigning.</td>
|
|||
|
<td></td>
|
|||
|
<td></td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00089.md">F00089</a></td>
|
|||
|
<td>target/name/flag "grey zone" website content</td>
|
|||
|
<td>"Gray zone" is second level of content producers and circulators, composed of outlets with uncertain attribution. This category covers conspiracy websites, far-right or far-left websites, news aggregators, and data dump websites</td>
|
|||
|
<td></td>
|
|||
|
<td>TA04 Develop Networks</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00090.md">F00090</a></td>
|
|||
|
<td>Match Punitive Tools with Third-Party Inducements</td>
|
|||
|
<td>Bring private sector and civil society into accord on U.S. interests</td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00091.md">F00091</a></td>
|
|||
|
<td>Partner to develop analytic methods & tools</td>
|
|||
|
<td>This might include working with relevant technology firms to ensure that contracted analytic support is available. Contracted support is reportedly valuable because technology to monitor social media data is continually evolving, and such firms can provide the expertise to help identify and analyze trends, and they can more effectively stay abreast of the changing systems and develop new models as they are required</td>
|
|||
|
<td></td>
|
|||
|
<td>TA01 Strategic Planning</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00092.md">F00092</a></td>
|
|||
|
<td>daylight</td>
|
|||
|
<td>Warn social media companies about an ongoing campaign (e.g. antivax sites). Anyone with datasets or data summaries can help with this</td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00093.md">F00093</a></td>
|
|||
|
<td>S4d detection and re-allocation approaches</td>
|
|||
|
<td>S4D is a way to separate out different speakers in text, audio. </td>
|
|||
|
<td>M004 - friction</td>
|
|||
|
<td>TA03 Develop People</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00094.md">F00094</a></td>
|
|||
|
<td>Registries alert when large batches of newsy URLs get registered together</td>
|
|||
|
<td></td>
|
|||
|
<td>M003 - daylight</td>
|
|||
|
<td>TA07 Channel Selection</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
<tr>
|
|||
|
<td><a href="detections/F00095.md">F00095</a></td>
|
|||
|
<td>Fact checking</td>
|
|||
|
<td>Process suspicious artifacts, narratives, and incidents</td>
|
|||
|
<td></td>
|
|||
|
<td>TA09 Exposure</td>
|
|||
|
<td>D01</td>
|
|||
|
</tr>
|
|||
|
</table>
|