64 lines
1.8 KiB
Markdown
Raw Normal View History

2022-07-02 14:09:24 -04:00
# Technique T0128.002: Conceal Network Identity
**Summary**: Concealing network identity aims to hide the existence an influence operations network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.
2022-07-02 14:09:24 -04:00
**Tactic**: TA11 Persist in the Information Environment **Parent Technique:** T0128 Conceal Information Assets
| Associated Technique | Description |
| --------- | ------------------------- |
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
# Technique T0128.002: Conceal Network Identity
**Summary**: Concealing network identity aims to hide the existence an influence operations network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.
**Tactic**: TA11 Persist in the Information Environment **Parent Technique:** T0128 Conceal Information Assets
| Associated Technique | Description |
| --------- | ------------------------- |
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
# Technique T0128.002: Conceal Network Identity
**Summary**: Concealing network identity aims to hide the existence an influence operations network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.
**Tactic**: TA11 Persist in the Information Environment
| Associated Technique | Description |
| --------- | ------------------------- |
2022-07-02 14:09:24 -04:00
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |