mirror of
https://github.com/DISARMFoundation/DISARMframeworks.git
synced 2025-12-16 00:33:51 -05:00
Updated technique descriptions and subtechnique mapping
This commit is contained in:
parent
14dc0cf8bb
commit
1450b8e5ff
160 changed files with 3510 additions and 3510 deletions
|
|
@ -23,125 +23,125 @@
|
|||
<tr>
|
||||
<td><a href="techniques/T0073.md">T0073 Determine Target Audiences</a></td>
|
||||
<td><a href="techniques/T0002.md">T0002 Facilitate State Propaganda</a></td>
|
||||
<td><a href="techniques/T0101.md">T0101 Create Localized Content</a></td>
|
||||
<td><a href="techniques/T0084.md">T0084 Reuse Existing Content</a></td>
|
||||
<td><a href="techniques/T0103.md">T0103 Livestream</a></td>
|
||||
<td><a href="techniques/T0113.md">T0113 Employ Commercial Analytic Firms</a></td>
|
||||
<td><a href="techniques/T0016.md">T0016 Create Clickbait</a></td>
|
||||
<td><a href="techniques/T0015.md">T0015 Create hashtags and search artifacts</a></td>
|
||||
<td><a href="techniques/T0029.md">T0029 Online polls</a></td>
|
||||
<td><a href="techniques/T0020.md">T0020 Trial content</a></td>
|
||||
<td><a href="techniques/T0114.md">T0114 Deliver Ads</a></td>
|
||||
<td><a href="techniques/T0126.md">T0126 Encourage Attendance at Events</a></td>
|
||||
<td><a href="techniques/T0131.md">T0131 Exploit TOS/Content Moderation</a></td>
|
||||
<td><a href="techniques/T0017.md">T0017 Conduct fundraising</a></td>
|
||||
<td><a href="techniques/T0059.md">T0059 Play the long game</a></td>
|
||||
<td><a href="techniques/T0132.md">T0132 Measure Performance</a></td>
|
||||
<td><a href="techniques/T0080.md">T0080 Map Target Audience Information Environment</a></td>
|
||||
<td><a href="techniques/T0082.md">T0082 Develop New Narratives</a></td>
|
||||
<td><a href="techniques/T0090.md">T0090 Create Inauthentic Accounts</a></td>
|
||||
<td><a href="techniques/T0097.md">T0097 Create personas</a></td>
|
||||
<td><a href="techniques/T0118.md">T0118 Amplify Existing Narrative</a></td>
|
||||
<td><a href="techniques/T0123.md">T0123 Control Information Environment through Offensive Cyberspace Operations</a></td>
|
||||
<td><a href="techniques/T0072.md">T0072 Segment Audiences</a></td>
|
||||
<td><a href="techniques/T0003.md">T0003 Leverage Existing Narratives</a></td>
|
||||
<td><a href="techniques/T0007.md">T0007 Create Inauthentic Social Media Pages and Groups</a></td>
|
||||
<td><a href="techniques/T0009.md">T0009 Create fake experts</a></td>
|
||||
<td><a href="techniques/T0049.md">T0049 Flooding the Information Space</a></td>
|
||||
<td><a href="techniques/T0047.md">T0047 Censor social media as a political force</a></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0074.md">T0074 Determine Strategic Ends</a></td>
|
||||
<td><a href="techniques/T0066.md">T0066 Degrade Adversary</a></td>
|
||||
<td><a href="techniques/T0102.md">T0102 Leverage Echo Chambers/Filter Bubbles</a></td>
|
||||
<td><a href="techniques/T0085.md">T0085 Develop Text-based Content</a></td>
|
||||
<td><a href="techniques/T0104.md">T0104 Social Networks</a></td>
|
||||
<td><a href="techniques/T0020.md">T0020 Trial content</a></td>
|
||||
<td><a href="techniques/T0018.md">T0018 Purchase Targeted Advertisements</a></td>
|
||||
<td><a href="techniques/T0019.md">T0019 Generate information pollution</a></td>
|
||||
<td><a href="techniques/T0043.md">T0043 Chat apps</a></td>
|
||||
<td><a href="techniques/T0039 .md">T0039 Bait legitimate influencers</a></td>
|
||||
<td><a href="techniques/T0115.md">T0115 Post Content</a></td>
|
||||
<td><a href="techniques/T0127.md">T0127 Physical Violence</a></td>
|
||||
<td><a href="techniques/T0059.md">T0059 Play the long game</a></td>
|
||||
<td><a href="techniques/T0057.md">T0057 Organize Events</a></td>
|
||||
<td><a href="techniques/T0060.md">T0060 Continue to Amplify</a></td>
|
||||
<td><a href="techniques/T0133.md">T0133 Measure Effectiveness</a></td>
|
||||
<td><a href="techniques/T0081.md">T0081 Identify Social and Technical Vulnerabilities</a></td>
|
||||
<td><a href="techniques/T0083.md">T0083 Integrate Target Audience Vulnerabilities into Narrative</a></td>
|
||||
<td><a href="techniques/T0091.md">T0091 Recruit bad actors</a></td>
|
||||
<td><a href="techniques/T0098.md">T0098 Establish Inauthentic News Sites</a></td>
|
||||
<td><a href="techniques/T0119.md">T0119 Cross-Posting</a></td>
|
||||
<td><a href="techniques/T0124.md">T0124 Suppress Opposition</a></td>
|
||||
<td><a href="techniques/T0080.md">T0080 Map Target Audience Information Environment</a></td>
|
||||
<td><a href="techniques/T0004.md">T0004 Develop Competing Narratives</a></td>
|
||||
<td><a href="techniques/T0010.md">T0010 Cultivate ignorant agents</a></td>
|
||||
<td><a href="techniques/T0011.md">T0011 Compromise legitimate accounts</a></td>
|
||||
<td><a href="techniques/T0118.md">T0118 Amplify Existing Narrative</a></td>
|
||||
<td><a href="techniques/T0048.md">T0048 Harass</a></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0075.md">T0075 Dismiss</a></td>
|
||||
<td><a href="techniques/T0016.md">T0016 Create Clickbait</a></td>
|
||||
<td><a href="techniques/T0086.md">T0086 Develop Image-based Content</a></td>
|
||||
<td><a href="techniques/T0105.md">T0105 Media Sharing Networks</a></td>
|
||||
<td><a href="techniques/T0039 .md">T0039 Bait legitimate influencers</a></td>
|
||||
<td><a href="techniques/T0101.md">T0101 Create Localized Content</a></td>
|
||||
<td><a href="techniques/T0023.md">T0023 Distort facts</a></td>
|
||||
<td><a href="techniques/T0103.md">T0103 Livestream</a></td>
|
||||
<td><a href="techniques/T0042.md">T0042 Seed Kernel of truth</a></td>
|
||||
<td><a href="techniques/T0116.md">T0116 Comment or Reply on Content</a></td>
|
||||
<td><a href="techniques/T0017.md">T0017 Conduct fundraising</a></td>
|
||||
<td><a href="techniques/T0060.md">T0060 Continue to Amplify</a></td>
|
||||
<td><a href="techniques/T0061.md">T0061 Sell Merchandise</a></td>
|
||||
<td><a href="techniques/T0128.md">T0128 Conceal People</a></td>
|
||||
<td><a href="techniques/T0134.md">T0134 Measure Effectiveness Indicators (or KPIs)</a></td>
|
||||
<td><a href="techniques/T0072.md">T0072 Segment Audiences</a></td>
|
||||
<td><a href="techniques/T0003.md">T0003 Leverage Existing Narratives</a></td>
|
||||
<td><a href="techniques/T0092.md">T0092 Build Network</a></td>
|
||||
<td><a href="techniques/T0099.md">T0099 Prepare Assets Impersonating Legitimate Entities</a></td>
|
||||
<td><a href="techniques/T0120.md">T0120 Incentivize Sharing</a></td>
|
||||
<td><a href="techniques/T0125.md">T0125 Platform Filtering</a></td>
|
||||
<td><a href="techniques/T0081.md">T0081 Identify Social and Technical Vulnerabilities</a></td>
|
||||
<td><a href="techniques/T0022.md">T0022 Leverage Conspiracy Theory Narratives</a></td>
|
||||
<td><a href="techniques/T0013.md">T0013 Create inauthentic websites</a></td>
|
||||
<td><a href="techniques/T0097.md">T0097 Create personas</a></td>
|
||||
<td><a href="techniques/T0119.md">T0119 Cross-Posting</a></td>
|
||||
<td><a href="techniques/T0123.md">T0123 Control Information Environment through Offensive Cyberspace Operations</a></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0076.md">T0076 Distort</a></td>
|
||||
<td><a href="techniques/T0018.md">T0018 Purchase Targeted Advertisements</a></td>
|
||||
<td><a href="techniques/T0087.md">T0087 Develop Video-based Content</a></td>
|
||||
<td><a href="techniques/T0106.md">T0106 Discussion Forums</a></td>
|
||||
<td><a href="techniques/T0042.md">T0042 Seed Kernel of truth</a></td>
|
||||
<td><a href="techniques/T0102.md">T0102 Leverage Echo Chambers/Filter Bubbles</a></td>
|
||||
<td><a href="techniques/T0084.md">T0084 Reuse Existing Content</a></td>
|
||||
<td><a href="techniques/T0104.md">T0104 Social Networks</a></td>
|
||||
<td><a href="techniques/T0044.md">T0044 Seed distortions</a></td>
|
||||
<td><a href="techniques/T0117.md">T0117 Attract Traditional Media</a></td>
|
||||
<td><a href="techniques/T0057.md">T0057 Organize Events</a></td>
|
||||
<td><a href="techniques/T0128.md">T0128 Conceal People</a></td>
|
||||
<td><a href="techniques/T0126.md">T0126 Encourage Attendance at Events</a></td>
|
||||
<td><a href="techniques/T0129.md">T0129 Conceal Operational Activity</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0004.md">T0004 Develop Competing Narratives</a></td>
|
||||
<td><a href="techniques/T0093.md">T0093 Acquire/ recruit Network</a></td>
|
||||
<td><a href="techniques/T0100.md">T0100 Co-opt Trusted Sources</a></td>
|
||||
<td><a href="techniques/T0121.md">T0121 Manipulate Platform Algorithm</a></td>
|
||||
<td><a href="techniques/T0047.md">T0047 Censor social media as a political force</a></td>
|
||||
<td><a href="techniques/T0040.md">T0040 Demand insurmountable proof</a></td>
|
||||
<td><a href="techniques/T0014.md">T0014 Prepare fundraising campaigns</a></td>
|
||||
<td><a href="techniques/T0098.md">T0098 Establish Inauthentic News Sites</a></td>
|
||||
<td><a href="techniques/T0120.md">T0120 Incentivize Sharing</a></td>
|
||||
<td><a href="techniques/T0124.md">T0124 Suppress Opposition</a></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0077.md">T0077 Distract</a></td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0088.md">T0088 Develop Audio-based Content</a></td>
|
||||
<td><a href="techniques/T0107.md">T0107 Bookmarking and Content Curation</a></td>
|
||||
<td><a href="techniques/T0044.md">T0044 Seed distortions</a></td>
|
||||
<td><a href="techniques/T0085.md">T0085 Develop Text-based Content</a></td>
|
||||
<td><a href="techniques/T0105.md">T0105 Media Sharing Networks</a></td>
|
||||
<td><a href="techniques/T0045.md">T0045 Use fake experts</a></td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0061.md">T0061 Sell Merchandise</a></td>
|
||||
<td><a href="techniques/T0129.md">T0129 Conceal Operational Activity</a></td>
|
||||
<td><a href="techniques/T0127.md">T0127 Physical Violence</a></td>
|
||||
<td><a href="techniques/T0130.md">T0130 Conceal Infrastructure</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0022.md">T0022 Leverage Conspiracy Theory Narratives</a></td>
|
||||
<td><a href="techniques/T0094.md">T0094 Infiltrate Existing Networks</a></td>
|
||||
<td><a href="techniques/T0009.md">T0009 Create fake experts</a></td>
|
||||
<td><a href="techniques/T0122.md">T0122 Direct Users to Alternative Platforms</a></td>
|
||||
<td><a href="techniques/T0048.md">T0048 Harass</a></td>
|
||||
<td><a href="techniques/T0068.md">T0068 Respond to Breaking News Event or Active Crisis</a></td>
|
||||
<td><a href="techniques/T0065.md">T0065 Prepare Physical Broadcast Capabilities</a></td>
|
||||
<td><a href="techniques/T0099.md">T0099 Prepare Assets Impersonating Legitimate Entities</a></td>
|
||||
<td><a href="techniques/T0121.md">T0121 Manipulate Platform Algorithm</a></td>
|
||||
<td><a href="techniques/T0125.md">T0125 Platform Filtering</a></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0078.md">T0078 Dismay</a></td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0089.md">T0089 Obtain Private Documents</a></td>
|
||||
<td><a href="techniques/T0108.md">T0108 Blogging and Publishing Networks</a></td>
|
||||
<td><a href="techniques/T0045.md">T0045 Use fake experts</a></td>
|
||||
<td><a href="techniques/T0086.md">T0086 Develop Image-based Content</a></td>
|
||||
<td><a href="techniques/T0106.md">T0106 Discussion Forums</a></td>
|
||||
<td><a href="techniques/T0046.md">T0046 Use Search Engine Optimization</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0130.md">T0130 Conceal Infrastructure</a></td>
|
||||
<td><a href="techniques/T0131.md">T0131 Exploit TOS/Content Moderation</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0040.md">T0040 Demand insurmountable proof</a></td>
|
||||
<td><a href="techniques/T0095.md">T0095 Develop Owned Media Assets</a></td>
|
||||
<td><a href="techniques/T0011.md">T0011 Compromise legitimate accounts</a></td>
|
||||
<td><a href="techniques/T0049.md">T0049 Flooding the Information Space</a></td>
|
||||
<td><a href="techniques/T0082.md">T0082 Develop New Narratives</a></td>
|
||||
<td><a href="techniques/T0090.md">T0090 Create Inauthentic Accounts</a></td>
|
||||
<td><a href="techniques/T0100.md">T0100 Co-opt Trusted Sources</a></td>
|
||||
<td><a href="techniques/T0122.md">T0122 Direct Users to Alternative Platforms</a></td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0079.md">T0079 Divide</a></td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0015.md">T0015 Create hashtags and search artifacts</a></td>
|
||||
<td><a href="techniques/T0109.md">T0109 Consumer Review Networks</a></td>
|
||||
<td><a href="techniques/T0046.md">T0046 Use Search Engine Optimization</a></td>
|
||||
<td><a href="techniques/T0087.md">T0087 Develop Video-based Content</a></td>
|
||||
<td><a href="techniques/T0107.md">T0107 Bookmarking and Content Curation</a></td>
|
||||
<td><a href="techniques/T0113.md">T0113 Employ Commercial Analytic Firms</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0068.md">T0068 Respond to Breaking News Event or Active Crisis</a></td>
|
||||
<td><a href="techniques/T0096.md">T0096 Leverage Content Farm</a></td>
|
||||
<td><a href="techniques/T0083.md">T0083 Integrate Target Audience Vulnerabilities into Narrative</a></td>
|
||||
<td><a href="techniques/T0091.md">T0091 Recruit bad actors</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
|
|
@ -150,7 +150,43 @@
|
|||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0019.md">T0019 Generate information pollution</a></td>
|
||||
<td><a href="techniques/T0088.md">T0088 Develop Audio-based Content</a></td>
|
||||
<td><a href="techniques/T0108.md">T0108 Blogging and Publishing Networks</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0092.md">T0092 Build Network</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0089.md">T0089 Obtain Private Documents</a></td>
|
||||
<td><a href="techniques/T0109.md">T0109 Consumer Review Networks</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0093.md">T0093 Acquire/ recruit Network</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0110.md">T0110 Formal Diplomatic Channels</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
|
|
@ -159,7 +195,7 @@
|
|||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0007.md">T0007 Create Inauthentic Social Media Pages and Groups</a></td>
|
||||
<td><a href="techniques/T0094.md">T0094 Infiltrate Existing Networks</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
|
|
@ -168,7 +204,7 @@
|
|||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0023.md">T0023 Distort facts</a></td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0111.md">T0111 Traditional Media</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
|
|
@ -177,7 +213,7 @@
|
|||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0010.md">T0010 Cultivate ignorant agents</a></td>
|
||||
<td><a href="techniques/T0095.md">T0095 Develop Owned Media Assets</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
|
|
@ -195,43 +231,7 @@
|
|||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0013.md">T0013 Create inauthentic websites</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0029.md">T0029 Online polls</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0014.md">T0014 Prepare fundraising campaigns</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0043.md">T0043 Chat apps</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td><a href="techniques/T0065.md">T0065 Prepare Physical Broadcast Capabilities</a></td>
|
||||
<td><a href="techniques/T0096.md">T0096 Leverage Content Farm</a></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0073: Determine Target Audiences
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Determining the target audiences (segments of the population) who will receive campaign narratives and artifacts intended to achieve the strategic ends.
|
||||
|
||||
* **Belongs to tactic stage**: TA01
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0074: Determine Strategic Ends
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Determining the campaigns goals or objectives. Examples include achieving achieving geopolitical advantage like undermining trust in an adversary, gaining domestic political advantage, achieving financial gain, or attaining a policy change,
|
||||
|
||||
* **Belongs to tactic stage**: TA01
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0082: Develop New Narratives
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Actors may develop new narratives to further strategic or tactical goals, especially when existing narratives adequately align with the campaign goals. New narratives provide more control in terms of crafting the message to achieve specific goals. However, new narratives may require more effort to disseminate than adapting or adopting existing narratives.
|
||||
|
||||
* **Belongs to tactic stage**: TA14
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0085: Develop Text-based Content
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Creating and editing false or misleading text-based artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign.
|
||||
|
||||
* **Belongs to tactic stage**: TA06
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0086: Develop Image-based Content
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Creating and editing false or misleading visual artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include photographing staged real-life situations, repurposing existing digital images, or using image creation and editing technologies.
|
||||
|
||||
* **Belongs to tactic stage**: TA06
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0087: Develop Video-based Content
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Creating and editing false or misleading video artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include staging videos of purportedly real situations, repurposing existing video artifacts, or using AI-generated video creation and editing technologies (including deepfakes).
|
||||
|
||||
* **Belongs to tactic stage**: TA06
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0088: Develop Audio-based Content
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Creating and editing false or misleading audio artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include creating completely new audio content, repurposing existing audio artifacts (including cheap fakes), or using AI-generated audio creation and editing technologies (including deepfakes).
|
||||
|
||||
* **Belongs to tactic stage**: TA06
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0089: Obtain Private Documents
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Procuring documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can include authentic non-public documents, authentic non-public documents have been altered, or inauthentic documents intended to appear as if they are authentic non-public documents. All of these types of documents can be "leaked" during later stages in the operation.
|
||||
|
||||
* **Belongs to tactic stage**: TA06
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0090: Create Inauthentic Accounts
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Inauthentic accounts include bot accounts, cyborg accounts, sockpuppet accounts, and anonymous accounts.
|
||||
|
||||
* **Belongs to tactic stage**: TA15
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0091: Recruit bad actors
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Operators recruit bad actors paying recruiting, or exerting control over individuals includes trolls, partisans, and contractors.
|
||||
|
||||
* **Belongs to tactic stage**: TA15
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0092: Build Network
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Operators build their own network, creating links between accounts -- whether authentic or inauthentic -- in order amplify and promote narratives and artifacts, and encourage further growth of ther network, as well as the ongoing sharing and engagement with operational content.
|
||||
|
||||
* **Belongs to tactic stage**: TA15
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0093: Acquire/ recruit Network
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Operators acquire an existing network by paying, recruiting, or exerting control over the leaders of the existing network.
|
||||
|
||||
* **Belongs to tactic stage**: TA15
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0094: Infiltrate Existing Networks
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Operators deceptively insert social assets into existing networks as group members in order to influence the members of the network and the wider information environment that the network impacts.
|
||||
|
||||
* **Belongs to tactic stage**: TA15
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0096: Leverage Content Farm
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Using the services of large-scale content providers for creating and amplifying campaign artifacts at scale.
|
||||
|
||||
* **Belongs to tactic stage**: TA15
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0097: Create personas
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Creating fake people, often with accounts across multiple platforms. These personas can be as simple as a name, can contain slightly more background like location, profile pictures, backstory, or can be effectively backstopped with indicators like fake identity documents.
|
||||
|
||||
* **Belongs to tactic stage**: TA16
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0103: Livestream
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: A livestream refers to an online broadcast capability that allows for real-time communication to closed or open networks.
|
||||
|
||||
* **Belongs to tactic stage**: TA07
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0104: Social Networks
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Social media are interactive digital channels that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks.
|
||||
|
||||
* **Belongs to tactic stage**: TA07
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0110: Formal Diplomatic Channels
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Leveraging formal, traditional, diplomatic channels to communicate with foreign governments (written documents, meetings, summits, diplomatic visits, etc). This type of diplomacy is conducted by diplomats of one nation with diplomats and other officials of another nation or international organization.
|
||||
|
||||
* **Belongs to tactic stage**: TA07
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0112: Email
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Delivering content and narratives via email. This can include using list management or high-value individually targeted messaging.
|
||||
|
||||
* **Belongs to tactic stage**: TA07
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0123: Control Information Environment through Offensive Cyberspace Operations
|
||||
|
||||
* **Summary**: Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.
|
||||
* **Summary**: Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.
|
||||
|
||||
* **Belongs to tactic stage**: TA18
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0124: Suppress Opposition
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Operators can suppress the opposition by exploiting platform content moderation tools and processes like reporting non-violative content to platforms for takedown and goading opposition actors into taking actions that result in platform action or target audience disapproval.
|
||||
|
||||
* **Belongs to tactic stage**: TA18
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0128: Conceal People
|
||||
|
||||
* **Summary**: Conceal the identity or provenance of the account and people assets.
|
||||
* **Summary**: Conceal the identity or provenance of a campaign's account and people assets to avoid takedown and attribution.
|
||||
|
||||
* **Belongs to tactic stage**: TA11
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0129: Conceal Operational Activity
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Conceal the campaign's operational activity to avoid takedown and attribution.
|
||||
|
||||
* **Belongs to tactic stage**: TA11
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0130: Conceal Infrastructure
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Conceal the campaign's infrastructure to avoid takedown and attribution.
|
||||
|
||||
* **Belongs to tactic stage**: TA11
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0131: Exploit TOS/Content Moderation
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Exploiting weaknesses in platforms' terms of service and content moderation policies to avoid takedowns and platform actions.
|
||||
|
||||
* **Belongs to tactic stage**: TA11
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0132: Measure Performance
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: A metric used to determine the accomplishment of actions. “Are the actions being executed as planned?”
|
||||
|
||||
* **Belongs to tactic stage**: TA12
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0133: Measure Effectiveness
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: A metric used to measure a current system state. “Are we on track to achieve the intended new system state within the planned timescale?”
|
||||
|
||||
* **Belongs to tactic stage**: TA12
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0134: Measure Effectiveness Indicators (or KPIs)
|
||||
|
||||
* **Summary**: tbd
|
||||
* **Summary**: Ensuring that Key Performace Indicators are identified and tracked, so that the performance and effectivess of campaigns, and elements of campaigns, can be measured, during and after their execution
|
||||
|
||||
* **Belongs to tactic stage**: TA12
|
||||
|
||||
|
|
|
|||
|
|
@ -8,336 +8,6 @@
|
|||
<th>tactic_id</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0073.md">T0073</a></td>
|
||||
<td>Determine Target Audiences</td>
|
||||
<td>tbd</td>
|
||||
<td>TA01</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0074.md">T0074</a></td>
|
||||
<td>Determine Strategic Ends</td>
|
||||
<td>tbd</td>
|
||||
<td>TA01</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0080.md">T0080</a></td>
|
||||
<td>Map Target Audience Information Environment</td>
|
||||
<td>Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience.
|
||||
Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.</td>
|
||||
<td>TA13</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0081.md">T0081</a></td>
|
||||
<td>Identify Social and Technical Vulnerabilities</td>
|
||||
<td>Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment.
|
||||
Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. </td>
|
||||
<td>TA13</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0082.md">T0082</a></td>
|
||||
<td>Develop New Narratives</td>
|
||||
<td>tbd</td>
|
||||
<td>TA14</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0083.md">T0083</a></td>
|
||||
<td>Integrate Target Audience Vulnerabilities into Narrative</td>
|
||||
<td>An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment.</td>
|
||||
<td>TA14</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0084.md">T0084</a></td>
|
||||
<td>Reuse Existing Content</td>
|
||||
<td>When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. </td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0085.md">T0085</a></td>
|
||||
<td>Develop Text-based Content</td>
|
||||
<td>tbd</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0086.md">T0086</a></td>
|
||||
<td>Develop Image-based Content</td>
|
||||
<td>tbd</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0087.md">T0087</a></td>
|
||||
<td>Develop Video-based Content</td>
|
||||
<td>tbd</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0088.md">T0088</a></td>
|
||||
<td>Develop Audio-based Content</td>
|
||||
<td>tbd</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0089.md">T0089</a></td>
|
||||
<td>Obtain Private Documents</td>
|
||||
<td>tbd</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0090.md">T0090</a></td>
|
||||
<td>Create Inauthentic Accounts</td>
|
||||
<td>tbd</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0091.md">T0091</a></td>
|
||||
<td>Recruit bad actors</td>
|
||||
<td>tbd</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0092.md">T0092</a></td>
|
||||
<td>Build Network</td>
|
||||
<td>tbd</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0093.md">T0093</a></td>
|
||||
<td>Acquire/ recruit Network</td>
|
||||
<td>tbd</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0094.md">T0094</a></td>
|
||||
<td>Infiltrate Existing Networks</td>
|
||||
<td>tbd</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0095.md">T0095</a></td>
|
||||
<td>Develop Owned Media Assets</td>
|
||||
<td>An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content.</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0096.md">T0096</a></td>
|
||||
<td>Leverage Content Farm</td>
|
||||
<td>tbd</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0097.md">T0097</a></td>
|
||||
<td>Create personas</td>
|
||||
<td>tbd</td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0098.md">T0098</a></td>
|
||||
<td>Establish Inauthentic News Sites</td>
|
||||
<td>Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.</td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0099.md">T0099</a></td>
|
||||
<td>Prepare Assets Impersonating Legitimate Entities</td>
|
||||
<td>An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities.
|
||||
An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. </td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0100.md">T0100</a></td>
|
||||
<td>Co-opt Trusted Sources</td>
|
||||
<td>An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include:
|
||||
- National or local new outlets
|
||||
- Research or academic publications
|
||||
- Online blogs or websites </td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0101.md">T0101</a></td>
|
||||
<td>Create Localized Content</td>
|
||||
<td>Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution.</td>
|
||||
<td>TA05</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0102.md">T0102</a></td>
|
||||
<td>Leverage Echo Chambers/Filter Bubbles</td>
|
||||
<td>An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. </td>
|
||||
<td>TA05</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0103.md">T0103</a></td>
|
||||
<td>Livestream</td>
|
||||
<td>tbd</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0104.md">T0104</a></td>
|
||||
<td>Social Networks</td>
|
||||
<td>tbd</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0105.md">T0105</a></td>
|
||||
<td>Media Sharing Networks</td>
|
||||
<td>Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0106.md">T0106</a></td>
|
||||
<td>Discussion Forums</td>
|
||||
<td>Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0107.md">T0107</a></td>
|
||||
<td>Bookmarking and Content Curation</td>
|
||||
<td>Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0108.md">T0108</a></td>
|
||||
<td>Blogging and Publishing Networks</td>
|
||||
<td>Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. </td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0109.md">T0109</a></td>
|
||||
<td>Consumer Review Networks</td>
|
||||
<td>Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0110.md">T0110</a></td>
|
||||
<td>Formal Diplomatic Channels</td>
|
||||
<td>tbd</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0111.md">T0111</a></td>
|
||||
<td>Traditional Media</td>
|
||||
<td>Examples include TV, Newspaper, Radio, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0112.md">T0112</a></td>
|
||||
<td>Email</td>
|
||||
<td>tbd</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0113.md">T0113</a></td>
|
||||
<td>Employ Commercial Analytic Firms</td>
|
||||
<td>Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. </td>
|
||||
<td>TA08</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0114.md">T0114</a></td>
|
||||
<td>Deliver Ads</td>
|
||||
<td>Delivering content via any form of paid media or advertising.</td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0115.md">T0115</a></td>
|
||||
<td>Post Content</td>
|
||||
<td>Delivering content by posting via owned media (assets that the operator controls). </td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0116.md">T0116</a></td>
|
||||
<td>Comment or Reply on Content</td>
|
||||
<td>Delivering content by replying or commenting via owned media (assets that the operator controls). </td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0117.md">T0117</a></td>
|
||||
<td>Attract Traditional Media</td>
|
||||
<td>Deliver content by attracting the attention of traditional media (earned media).</td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0118.md">T0118</a></td>
|
||||
<td>Amplify Existing Narrative</td>
|
||||
<td>An influence operation may amplify existing narratives that align with its narratives to support operation objectives. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0119.md">T0119</a></td>
|
||||
<td>Cross-Posting</td>
|
||||
<td>Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0120.md">T0120</a></td>
|
||||
<td>Incentivize Sharing</td>
|
||||
<td>Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.</td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0121.md">T0121</a></td>
|
||||
<td>Manipulate Platform Algorithm</td>
|
||||
<td>Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0122.md">T0122</a></td>
|
||||
<td>Direct Users to Alternative Platforms</td>
|
||||
<td>Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0123.md">T0123</a></td>
|
||||
<td>Control Information Environment through Offensive Cyberspace Operations</td>
|
||||
<td>Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.</td>
|
||||
<td>TA18</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0124.md">T0124</a></td>
|
||||
<td>Suppress Opposition</td>
|
||||
<td>tbd</td>
|
||||
<td>TA18</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0125.md">T0125</a></td>
|
||||
<td>Platform Filtering</td>
|
||||
<td>Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation)</td>
|
||||
<td>TA18</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0126.md">T0126</a></td>
|
||||
<td>Encourage Attendance at Events</td>
|
||||
<td>Operation encourages attendance at existing real world event.</td>
|
||||
<td>TA10</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0127.md">T0127</a></td>
|
||||
<td>Physical Violence</td>
|
||||
<td>Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. </td>
|
||||
<td>TA10</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0131.md">T0131</a></td>
|
||||
<td>Exploit TOS/Content Moderation</td>
|
||||
<td>tbd</td>
|
||||
<td>TA11</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0132.md">T0132</a></td>
|
||||
<td>Measure Performance</td>
|
||||
<td>tbd</td>
|
||||
<td>TA12</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0133.md">T0133</a></td>
|
||||
<td>Measure Effectiveness</td>
|
||||
<td>tbd</td>
|
||||
<td>TA12</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0134.md">T0134</a></td>
|
||||
<td>Measure Effectiveness Indicators (or KPIs)</td>
|
||||
<td>tbd</td>
|
||||
<td>TA12</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0002.md">T0002</a></td>
|
||||
<td>Facilitate State Propaganda</td>
|
||||
<td>Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda.</td>
|
||||
|
|
@ -554,6 +224,18 @@ An influence operation may use a wide variety of cyber techniques to impersonate
|
|||
<td>TA13</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0073.md">T0073</a></td>
|
||||
<td>Determine Target Audiences</td>
|
||||
<td>Determining the target audiences (segments of the population) who will receive campaign narratives and artifacts intended to achieve the strategic ends.</td>
|
||||
<td>TA01</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0074.md">T0074</a></td>
|
||||
<td>Determine Strategic Ends</td>
|
||||
<td>Determining the campaigns goals or objectives. Examples include achieving achieving geopolitical advantage like undermining trust in an adversary, gaining domestic political advantage, achieving financial gain, or attaining a policy change, </td>
|
||||
<td>TA01</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0075.md">T0075</a></td>
|
||||
<td>Dismiss</td>
|
||||
<td>Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased.</td>
|
||||
|
|
@ -584,21 +266,339 @@ An influence operation may use a wide variety of cyber techniques to impersonate
|
|||
<td>TA02</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0080.md">T0080</a></td>
|
||||
<td>Map Target Audience Information Environment</td>
|
||||
<td>Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience.
|
||||
Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.</td>
|
||||
<td>TA13</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0081.md">T0081</a></td>
|
||||
<td>Identify Social and Technical Vulnerabilities</td>
|
||||
<td>Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment.
|
||||
Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. </td>
|
||||
<td>TA13</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0082.md">T0082</a></td>
|
||||
<td>Develop New Narratives</td>
|
||||
<td>Actors may develop new narratives to further strategic or tactical goals, especially when existing narratives adequately align with the campaign goals. New narratives provide more control in terms of crafting the message to achieve specific goals. However, new narratives may require more effort to disseminate than adapting or adopting existing narratives. </td>
|
||||
<td>TA14</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0083.md">T0083</a></td>
|
||||
<td>Integrate Target Audience Vulnerabilities into Narrative</td>
|
||||
<td>An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment.</td>
|
||||
<td>TA14</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0084.md">T0084</a></td>
|
||||
<td>Reuse Existing Content</td>
|
||||
<td>When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. </td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0085.md">T0085</a></td>
|
||||
<td>Develop Text-based Content</td>
|
||||
<td>Creating and editing false or misleading text-based artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign.</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0086.md">T0086</a></td>
|
||||
<td>Develop Image-based Content</td>
|
||||
<td>Creating and editing false or misleading visual artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include photographing staged real-life situations, repurposing existing digital images, or using image creation and editing technologies.</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0087.md">T0087</a></td>
|
||||
<td>Develop Video-based Content</td>
|
||||
<td>Creating and editing false or misleading video artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include staging videos of purportedly real situations, repurposing existing video artifacts, or using AI-generated video creation and editing technologies (including deepfakes).</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0088.md">T0088</a></td>
|
||||
<td>Develop Audio-based Content</td>
|
||||
<td>Creating and editing false or misleading audio artifacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include creating completely new audio content, repurposing existing audio artifacts (including cheap fakes), or using AI-generated audio creation and editing technologies (including deepfakes).</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0089.md">T0089</a></td>
|
||||
<td>Obtain Private Documents</td>
|
||||
<td>Procuring documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can include authentic non-public documents, authentic non-public documents have been altered, or inauthentic documents intended to appear as if they are authentic non-public documents. All of these types of documents can be "leaked" during later stages in the operation.</td>
|
||||
<td>TA06</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0090.md">T0090</a></td>
|
||||
<td>Create Inauthentic Accounts</td>
|
||||
<td>Inauthentic accounts include bot accounts, cyborg accounts, sockpuppet accounts, and anonymous accounts.</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0091.md">T0091</a></td>
|
||||
<td>Recruit bad actors</td>
|
||||
<td>Operators recruit bad actors paying recruiting, or exerting control over individuals includes trolls, partisans, and contractors.</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0092.md">T0092</a></td>
|
||||
<td>Build Network</td>
|
||||
<td>Operators build their own network, creating links between accounts -- whether authentic or inauthentic -- in order amplify and promote narratives and artifacts, and encourage further growth of ther network, as well as the ongoing sharing and engagement with operational content.</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0093.md">T0093</a></td>
|
||||
<td>Acquire/ recruit Network</td>
|
||||
<td>Operators acquire an existing network by paying, recruiting, or exerting control over the leaders of the existing network. </td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0094.md">T0094</a></td>
|
||||
<td>Infiltrate Existing Networks</td>
|
||||
<td>Operators deceptively insert social assets into existing networks as group members in order to influence the members of the network and the wider information environment that the network impacts.</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0095.md">T0095</a></td>
|
||||
<td>Develop Owned Media Assets</td>
|
||||
<td>An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content.</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0096.md">T0096</a></td>
|
||||
<td>Leverage Content Farm</td>
|
||||
<td>Using the services of large-scale content providers for creating and amplifying campaign artifacts at scale.</td>
|
||||
<td>TA15</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0097.md">T0097</a></td>
|
||||
<td>Create personas</td>
|
||||
<td>Creating fake people, often with accounts across multiple platforms. These personas can be as simple as a name, can contain slightly more background like location, profile pictures, backstory, or can be effectively backstopped with indicators like fake identity documents. </td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0098.md">T0098</a></td>
|
||||
<td>Establish Inauthentic News Sites</td>
|
||||
<td>Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.</td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0099.md">T0099</a></td>
|
||||
<td>Prepare Assets Impersonating Legitimate Entities</td>
|
||||
<td>An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities.
|
||||
An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. </td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0100.md">T0100</a></td>
|
||||
<td>Co-opt Trusted Sources</td>
|
||||
<td>An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include:
|
||||
- National or local new outlets
|
||||
- Research or academic publications
|
||||
- Online blogs or websites </td>
|
||||
<td>TA16</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0101.md">T0101</a></td>
|
||||
<td>Create Localized Content</td>
|
||||
<td>Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution.</td>
|
||||
<td>TA05</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0102.md">T0102</a></td>
|
||||
<td>Leverage Echo Chambers/Filter Bubbles</td>
|
||||
<td>An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. </td>
|
||||
<td>TA05</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0103.md">T0103</a></td>
|
||||
<td>Livestream</td>
|
||||
<td>A livestream refers to an online broadcast capability that allows for real-time communication to closed or open networks.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0104.md">T0104</a></td>
|
||||
<td>Social Networks</td>
|
||||
<td>Social media are interactive digital channels that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0105.md">T0105</a></td>
|
||||
<td>Media Sharing Networks</td>
|
||||
<td>Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0106.md">T0106</a></td>
|
||||
<td>Discussion Forums</td>
|
||||
<td>Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0107.md">T0107</a></td>
|
||||
<td>Bookmarking and Content Curation</td>
|
||||
<td>Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0108.md">T0108</a></td>
|
||||
<td>Blogging and Publishing Networks</td>
|
||||
<td>Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. </td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0109.md">T0109</a></td>
|
||||
<td>Consumer Review Networks</td>
|
||||
<td>Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0110.md">T0110</a></td>
|
||||
<td>Formal Diplomatic Channels</td>
|
||||
<td>Leveraging formal, traditional, diplomatic channels to communicate with foreign governments (written documents, meetings, summits, diplomatic visits, etc). This type of diplomacy is conducted by diplomats of one nation with diplomats and other officials of another nation or international organization.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0111.md">T0111</a></td>
|
||||
<td>Traditional Media</td>
|
||||
<td>Examples include TV, Newspaper, Radio, etc.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0112.md">T0112</a></td>
|
||||
<td>Email</td>
|
||||
<td>Delivering content and narratives via email. This can include using list management or high-value individually targeted messaging.</td>
|
||||
<td>TA07</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0113.md">T0113</a></td>
|
||||
<td>Employ Commercial Analytic Firms</td>
|
||||
<td>Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. </td>
|
||||
<td>TA08</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0114.md">T0114</a></td>
|
||||
<td>Deliver Ads</td>
|
||||
<td>Delivering content via any form of paid media or advertising.</td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0115.md">T0115</a></td>
|
||||
<td>Post Content</td>
|
||||
<td>Delivering content by posting via owned media (assets that the operator controls). </td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0116.md">T0116</a></td>
|
||||
<td>Comment or Reply on Content</td>
|
||||
<td>Delivering content by replying or commenting via owned media (assets that the operator controls). </td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0117.md">T0117</a></td>
|
||||
<td>Attract Traditional Media</td>
|
||||
<td>Deliver content by attracting the attention of traditional media (earned media).</td>
|
||||
<td>TA09</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0118.md">T0118</a></td>
|
||||
<td>Amplify Existing Narrative</td>
|
||||
<td>An influence operation may amplify existing narratives that align with its narratives to support operation objectives. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0119.md">T0119</a></td>
|
||||
<td>Cross-Posting</td>
|
||||
<td>Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0120.md">T0120</a></td>
|
||||
<td>Incentivize Sharing</td>
|
||||
<td>Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.</td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0121.md">T0121</a></td>
|
||||
<td>Manipulate Platform Algorithm</td>
|
||||
<td>Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0122.md">T0122</a></td>
|
||||
<td>Direct Users to Alternative Platforms</td>
|
||||
<td>Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. </td>
|
||||
<td>TA17</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0123.md">T0123</a></td>
|
||||
<td>Control Information Environment through Offensive Cyberspace Operations</td>
|
||||
<td>Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.</td>
|
||||
<td>TA18</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0124.md">T0124</a></td>
|
||||
<td>Suppress Opposition</td>
|
||||
<td>Operators can suppress the opposition by exploiting platform content moderation tools and processes like reporting non-violative content to platforms for takedown and goading opposition actors into taking actions that result in platform action or target audience disapproval. </td>
|
||||
<td>TA18</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0125.md">T0125</a></td>
|
||||
<td>Platform Filtering</td>
|
||||
<td>Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation)</td>
|
||||
<td>TA18</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0126.md">T0126</a></td>
|
||||
<td>Encourage Attendance at Events</td>
|
||||
<td>Operation encourages attendance at existing real world event.</td>
|
||||
<td>TA10</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0127.md">T0127</a></td>
|
||||
<td>Physical Violence</td>
|
||||
<td>Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. </td>
|
||||
<td>TA10</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0128.md">T0128</a></td>
|
||||
<td>Conceal People</td>
|
||||
<td>Conceal the identity or provenance of the account and people assets.</td>
|
||||
<td>Conceal the identity or provenance of a campaign's account and people assets to avoid takedown and attribution.</td>
|
||||
<td>TA11</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0129.md">T0129</a></td>
|
||||
<td>Conceal Operational Activity</td>
|
||||
<td>tbd</td>
|
||||
<td>Conceal the campaign's operational activity to avoid takedown and attribution.</td>
|
||||
<td>TA11</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0130.md">T0130</a></td>
|
||||
<td>Conceal Infrastructure</td>
|
||||
<td>tbd</td>
|
||||
<td>Conceal the campaign's infrastructure to avoid takedown and attribution.</td>
|
||||
<td>TA11</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0131.md">T0131</a></td>
|
||||
<td>Exploit TOS/Content Moderation</td>
|
||||
<td>Exploiting weaknesses in platforms' terms of service and content moderation policies to avoid takedowns and platform actions.</td>
|
||||
<td>TA11</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0132.md">T0132</a></td>
|
||||
<td>Measure Performance</td>
|
||||
<td>A metric used to determine the accomplishment of actions. “Are the actions being executed as planned?”</td>
|
||||
<td>TA12</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0133.md">T0133</a></td>
|
||||
<td>Measure Effectiveness</td>
|
||||
<td>A metric used to measure a current system state. “Are we on track to achieve the intended new system state within the planned timescale?”</td>
|
||||
<td>TA12</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="techniques/T0134.md">T0134</a></td>
|
||||
<td>Measure Effectiveness Indicators (or KPIs)</td>
|
||||
<td>Ensuring that Key Performace Indicators are identified and tracked, so that the performance and effectivess of campaigns, and elements of campaigns, can be measured, during and after their execution</td>
|
||||
<td>TA12</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue