try fix for repeated generated_pages string

This commit is contained in:
Sara-Jayne Terp 2022-07-01 17:12:05 +01:00
parent a483bf4c80
commit 5b73d3afab
27 changed files with 685 additions and 937 deletions

BIN
.DS_Store vendored

Binary file not shown.

BIN
CODE/.DS_Store vendored

Binary file not shown.

View File

@ -18,7 +18,7 @@
},
{
"cell_type": "code",
"execution_count": 3,
"execution_count": 1,
"metadata": {
"scrolled": true
},
@ -33,13 +33,10 @@
"updated ../generated_files/disarm_blue_framework_clickable.html\n",
"Temp: objecttype phase\n",
"updated ../generated_pages/phases_index.md\n",
"Updating ../generated_pages/phases/P04.md\n",
"Temp: objecttype tactic\n",
"updated ../generated_pages/tactics_index.md\n",
"Updating ../generated_pages/tactics/TA01.md\n",
"Updating ../generated_pages/tactics/TA02.md\n",
"Updating ../generated_pages/tactics/TA03.md\n",
"Updating ../generated_pages/tactics/TA04.md\n",
"Updating ../generated_pages/tactics/TA05.md\n",
"Updating ../generated_pages/tactics/TA06.md\n",
"Updating ../generated_pages/tactics/TA07.md\n",
@ -52,265 +49,16 @@
"Updating ../generated_pages/tactics/TA14.md\n",
"Updating ../generated_pages/tactics/TA15.md\n",
"Updating ../generated_pages/tactics/TA16.md\n",
"Updating ../generated_pages/tactics/TA17.md\n",
"Updating ../generated_pages/tactics/TA18.md\n",
"Temp: objecttype technique\n",
"updated ../generated_pages/techniques_index.md\n",
"Updating ../generated_pages/techniques/T0001.md\n",
"Updating ../generated_pages/techniques/T0002.md\n",
"Updating ../generated_pages/techniques/T0003.md\n",
"Updating ../generated_pages/techniques/T0004.md\n",
"Updating ../generated_pages/techniques/T0005.md\n",
"Updating ../generated_pages/techniques/T0006.md\n",
"Updating ../generated_pages/techniques/T0007.md\n",
"Updating ../generated_pages/techniques/T0008.md\n",
"Updating ../generated_pages/techniques/T0009.md\n",
"Updating ../generated_pages/techniques/T0010.md\n",
"Updating ../generated_pages/techniques/T0011.md\n",
"Updating ../generated_pages/techniques/T0012.md\n",
"Updating ../generated_pages/techniques/T0013.md\n",
"Updating ../generated_pages/techniques/T0014.md\n",
"Updating ../generated_pages/techniques/T0015.md\n",
"Updating ../generated_pages/techniques/T0016.md\n",
"Updating ../generated_pages/techniques/T0017.md\n",
"Updating ../generated_pages/techniques/T0018.md\n",
"Updating ../generated_pages/techniques/T0019.md\n",
"Updating ../generated_pages/techniques/T0020.md\n",
"Updating ../generated_pages/techniques/T0021.md\n",
"Updating ../generated_pages/techniques/T0022.md\n",
"Updating ../generated_pages/techniques/T0023.md\n",
"Updating ../generated_pages/techniques/T0024.md\n",
"Updating ../generated_pages/techniques/T0025.md\n",
"Updating ../generated_pages/techniques/T0026.md\n",
"Updating ../generated_pages/techniques/T0027.md\n",
"Updating ../generated_pages/techniques/T0028.md\n",
"Updating ../generated_pages/techniques/T0029.md\n",
"Updating ../generated_pages/techniques/T0030.md\n",
"Updating ../generated_pages/techniques/T0031.md\n",
"Updating ../generated_pages/techniques/T0032.md\n",
"Updating ../generated_pages/techniques/T0033.md\n",
"Updating ../generated_pages/techniques/T0034.md\n",
"Updating ../generated_pages/techniques/T0035.md\n",
"Updating ../generated_pages/techniques/T0036.md\n",
"Updating ../generated_pages/techniques/T0037.md\n",
"Updating ../generated_pages/techniques/T0038.md\n",
"Updating ../generated_pages/techniques/T0039.md\n",
"Updating ../generated_pages/techniques/T0040.md\n",
"Updating ../generated_pages/techniques/T0041.md\n",
"Updating ../generated_pages/techniques/T0042.md\n",
"Updating ../generated_pages/techniques/T0043.md\n",
"Updating ../generated_pages/techniques/T0044.md\n",
"Updating ../generated_pages/techniques/T0045.md\n",
"Updating ../generated_pages/techniques/T0046.md\n",
"Updating ../generated_pages/techniques/T0047.md\n",
"Updating ../generated_pages/techniques/T0048.md\n",
"Updating ../generated_pages/techniques/T0049.md\n",
"Updating ../generated_pages/techniques/T0050.md\n",
"Updating ../generated_pages/techniques/T0051.md\n",
"Updating ../generated_pages/techniques/T0052.md\n",
"Updating ../generated_pages/techniques/T0053.md\n",
"Updating ../generated_pages/techniques/T0054.md\n",
"Updating ../generated_pages/techniques/T0055.md\n",
"Updating ../generated_pages/techniques/T0056.md\n",
"Updating ../generated_pages/techniques/T0057.md\n",
"Updating ../generated_pages/techniques/T0058.md\n",
"Updating ../generated_pages/techniques/T0059.md\n",
"Updating ../generated_pages/techniques/T0060.md\n",
"Updating ../generated_pages/techniques/T0061.md\n",
"Updating ../generated_pages/techniques/T0062.md\n",
"Updating ../generated_pages/techniques/T0063.md\n",
"Updating ../generated_pages/techniques/T0064.md\n",
"Updating ../generated_pages/techniques/T0065.md\n",
"Updating ../generated_pages/techniques/T0066.md\n",
"Updating ../generated_pages/techniques/T0067.md\n",
"Updating ../generated_pages/techniques/T0068.md\n",
"Updating ../generated_pages/techniques/T0069.md\n",
"Updating ../generated_pages/techniques/T0070.md\n",
"Updating ../generated_pages/techniques/T0071.md\n",
"Updating ../generated_pages/techniques/T0072.md\n",
"Updating ../generated_pages/techniques/T0073.md\n",
"Updating ../generated_pages/techniques/T0074.md\n",
"Updating ../generated_pages/techniques/T0075.md\n",
"Updating ../generated_pages/techniques/T0076.md\n",
"Updating ../generated_pages/techniques/T0077.md\n",
"Updating ../generated_pages/techniques/T0078.md\n",
"Updating ../generated_pages/techniques/T0079.md\n",
"Updating ../generated_pages/techniques/T0080.md\n",
"Updating ../generated_pages/techniques/T0081.md\n",
"Updating ../generated_pages/techniques/T0082.md\n",
"Updating ../generated_pages/techniques/T0083.md\n",
"Updating ../generated_pages/techniques/T0084.md\n",
"Updating ../generated_pages/techniques/T0085.md\n",
"Updating ../generated_pages/techniques/T0086.md\n",
"Updating ../generated_pages/techniques/T0087.md\n",
"Updating ../generated_pages/techniques/T0088.md\n",
"Updating ../generated_pages/techniques/T0089.md\n",
"Updating ../generated_pages/techniques/T0090.md\n",
"Updating ../generated_pages/techniques/T0091.md\n",
"Updating ../generated_pages/techniques/T0092.md\n",
"Updating ../generated_pages/techniques/T0093.md\n",
"Updating ../generated_pages/techniques/T0094.md\n",
"Updating ../generated_pages/techniques/T0095.md\n",
"Updating ../generated_pages/techniques/T0096.md\n",
"Updating ../generated_pages/techniques/T0097.md\n",
"Temp: objecttype task\n",
"updated ../generated_pages/tasks_index.md\n",
"Temp: objecttype incident\n",
"updated ../generated_pages/incidents_index.md\n",
"Updating ../generated_pages/incidents/I00002.md\n",
"Updating ../generated_pages/incidents/I00005.md\n",
"Updating ../generated_pages/incidents/I00006.md\n",
"Updating ../generated_pages/incidents/I00007.md\n",
"Updating ../generated_pages/incidents/I00009.md\n",
"Updating ../generated_pages/incidents/I00010.md\n",
"Updating ../generated_pages/incidents/I00015.md\n",
"Updating ../generated_pages/incidents/I00017.md\n",
"Updating ../generated_pages/incidents/I00022.md\n",
"Updating ../generated_pages/incidents/I00029.md\n",
"Updating ../generated_pages/incidents/I00032.md\n",
"Updating ../generated_pages/incidents/I00033.md\n",
"Updating ../generated_pages/incidents/I00034.md\n",
"Updating ../generated_pages/incidents/I00042.md\n",
"Updating ../generated_pages/incidents/I00044.md\n",
"Updating ../generated_pages/incidents/I00047.md\n",
"Updating ../generated_pages/incidents/I00049.md\n",
"Updating ../generated_pages/incidents/I00050.md\n",
"Updating ../generated_pages/incidents/I00051.md\n",
"Updating ../generated_pages/incidents/I00053.md\n",
"Updating ../generated_pages/incidents/I00056.md\n",
"Updating ../generated_pages/incidents/I00063.md\n",
"Temp: objecttype counter\n",
"updated ../generated_pages/counters_index.md\n",
"Updating ../generated_pages/counters/C00006.md\n",
"Updating ../generated_pages/counters/C00008.md\n",
"Updating ../generated_pages/counters/C00009.md\n",
"Updating ../generated_pages/counters/C00010.md\n",
"Updating ../generated_pages/counters/C00011.md\n",
"Updating ../generated_pages/counters/C00012.md\n",
"Updating ../generated_pages/counters/C00013.md\n",
"Updating ../generated_pages/counters/C00014.md\n",
"Updating ../generated_pages/counters/C00016.md\n",
"Updating ../generated_pages/counters/C00017.md\n",
"Updating ../generated_pages/counters/C00019.md\n",
"Updating ../generated_pages/counters/C00021.md\n",
"Updating ../generated_pages/counters/C00022.md\n",
"Updating ../generated_pages/counters/C00024.md\n",
"Updating ../generated_pages/counters/C00026.md\n",
"Updating ../generated_pages/counters/C00027.md\n",
"Updating ../generated_pages/counters/C00029.md\n",
"Updating ../generated_pages/counters/C00030.md\n",
"Updating ../generated_pages/counters/C00031.md\n",
"Updating ../generated_pages/counters/C00032.md\n",
"Updating ../generated_pages/counters/C00034.md\n",
"Updating ../generated_pages/counters/C00036.md\n",
"Updating ../generated_pages/counters/C00040.md\n",
"Updating ../generated_pages/counters/C00042.md\n",
"Updating ../generated_pages/counters/C00044.md\n",
"Updating ../generated_pages/counters/C00046.md\n",
"Updating ../generated_pages/counters/C00047.md\n",
"Updating ../generated_pages/counters/C00048.md\n",
"Updating ../generated_pages/counters/C00051.md\n",
"Updating ../generated_pages/counters/C00052.md\n",
"Updating ../generated_pages/counters/C00053.md\n"
]
},
{
"name": "stdout",
"output_type": "stream",
"text": [
"Updating ../generated_pages/counters/C00058.md\n",
"Updating ../generated_pages/counters/C00059.md\n",
"Updating ../generated_pages/counters/C00060.md\n",
"Updating ../generated_pages/counters/C00065.md\n",
"Updating ../generated_pages/counters/C00066.md\n",
"Updating ../generated_pages/counters/C00067.md\n",
"Updating ../generated_pages/counters/C00070.md\n",
"Updating ../generated_pages/counters/C00071.md\n",
"Updating ../generated_pages/counters/C00072.md\n",
"Updating ../generated_pages/counters/C00073.md\n",
"Updating ../generated_pages/counters/C00074.md\n",
"Updating ../generated_pages/counters/C00076.md\n",
"Updating ../generated_pages/counters/C00078.md\n",
"Updating ../generated_pages/counters/C00080.md\n",
"Updating ../generated_pages/counters/C00081.md\n",
"Updating ../generated_pages/counters/C00082.md\n",
"Updating ../generated_pages/counters/C00084.md\n",
"Updating ../generated_pages/counters/C00085.md\n",
"Updating ../generated_pages/counters/C00086.md\n",
"Updating ../generated_pages/counters/C00087.md\n",
"Updating ../generated_pages/counters/C00090.md\n",
"Updating ../generated_pages/counters/C00091.md\n",
"Updating ../generated_pages/counters/C00092.md\n",
"Updating ../generated_pages/counters/C00093.md\n",
"Updating ../generated_pages/counters/C00094.md\n",
"Updating ../generated_pages/counters/C00096.md\n",
"Updating ../generated_pages/counters/C00097.md\n",
"Updating ../generated_pages/counters/C00098.md\n",
"Updating ../generated_pages/counters/C00099.md\n",
"Updating ../generated_pages/counters/C00100.md\n",
"Updating ../generated_pages/counters/C00101.md\n",
"Updating ../generated_pages/counters/C00103.md\n",
"Updating ../generated_pages/counters/C00105.md\n",
"Updating ../generated_pages/counters/C00106.md\n",
"Updating ../generated_pages/counters/C00107.md\n",
"Updating ../generated_pages/counters/C00111.md\n",
"Updating ../generated_pages/counters/C00112.md\n",
"Updating ../generated_pages/counters/C00113.md\n",
"Updating ../generated_pages/counters/C00114.md\n",
"Updating ../generated_pages/counters/C00115.md\n",
"Updating ../generated_pages/counters/C00116.md\n",
"Updating ../generated_pages/counters/C00117.md\n",
"Updating ../generated_pages/counters/C00118.md\n",
"Updating ../generated_pages/counters/C00119.md\n",
"Updating ../generated_pages/counters/C00120.md\n",
"Updating ../generated_pages/counters/C00121.md\n",
"Updating ../generated_pages/counters/C00122.md\n",
"Updating ../generated_pages/counters/C00123.md\n",
"Updating ../generated_pages/counters/C00124.md\n",
"Updating ../generated_pages/counters/C00125.md\n",
"Updating ../generated_pages/counters/C00126.md\n",
"Updating ../generated_pages/counters/C00128.md\n",
"Updating ../generated_pages/counters/C00129.md\n",
"Updating ../generated_pages/counters/C00130.md\n",
"Updating ../generated_pages/counters/C00131.md\n",
"Updating ../generated_pages/counters/C00133.md\n",
"Updating ../generated_pages/counters/C00135.md\n",
"Updating ../generated_pages/counters/C00136.md\n",
"Updating ../generated_pages/counters/C00138.md\n",
"Updating ../generated_pages/counters/C00142.md\n",
"Updating ../generated_pages/counters/C00143.md\n",
"Updating ../generated_pages/counters/C00144.md\n",
"Updating ../generated_pages/counters/C00147.md\n",
"Updating ../generated_pages/counters/C00148.md\n",
"Updating ../generated_pages/counters/C00149.md\n",
"Updating ../generated_pages/counters/C00153.md\n",
"Updating ../generated_pages/counters/C00154.md\n",
"Updating ../generated_pages/counters/C00155.md\n",
"Updating ../generated_pages/counters/C00156.md\n",
"Updating ../generated_pages/counters/C00160.md\n",
"Updating ../generated_pages/counters/C00161.md\n",
"Updating ../generated_pages/counters/C00162.md\n",
"Updating ../generated_pages/counters/C00164.md\n",
"Updating ../generated_pages/counters/C00165.md\n",
"Updating ../generated_pages/counters/C00169.md\n",
"Updating ../generated_pages/counters/C00172.md\n",
"Updating ../generated_pages/counters/C00174.md\n",
"Updating ../generated_pages/counters/C00176.md\n",
"Updating ../generated_pages/counters/C00178.md\n",
"Updating ../generated_pages/counters/C00182.md\n",
"Updating ../generated_pages/counters/C00184.md\n",
"Updating ../generated_pages/counters/C00188.md\n",
"Updating ../generated_pages/counters/C00189.md\n",
"Updating ../generated_pages/counters/C00190.md\n",
"Updating ../generated_pages/counters/C00195.md\n",
"Updating ../generated_pages/counters/C00197.md\n",
"Updating ../generated_pages/counters/C00200.md\n",
"Updating ../generated_pages/counters/C00202.md\n",
"Updating ../generated_pages/counters/C00203.md\n",
"Updating ../generated_pages/counters/C00205.md\n",
"Updating ../generated_pages/counters/C00207.md\n",
"Updating ../generated_pages/counters/C00211.md\n",
"Updating ../generated_pages/counters/C00212.md\n",
"Updating ../generated_pages/counters/C00216.md\n",
"Updating ../generated_pages/counters/C00219.md\n",
"Temp: objecttype metatechnique\n",
"updated ../generated_pages/metatechniques_index.md\n",
"Temp: objecttype actortype\n",

View File

@ -241,7 +241,7 @@ class Disarm:
tactic_techniques = self.df_techniques[self.df_techniques['tactic_id']==tactic_id]
row_string = '| [{0} {1}]({2}techniques/{0}.md) |\n'
for index, row in tactic_techniques.sort_values('disarm_id').iterrows():
table_string += row_string.format(row['disarm_id'], row['name'], GENERATED_PAGES_DIR)
table_string += row_string.format(row['disarm_id'], row['name'], '')
return table_string

View File

@ -62,161 +62,125 @@ function handleTechniqueClick(box) {
<tr>
<td id="T0073">T0073 Determine Target Audiences<input type="checkbox" id="T0073check" onclick="handleTechniqueClick('T0073')"></td>
<td id="T0002">T0002 Facilitate State Propaganda<input type="checkbox" id="T0002check" onclick="handleTechniqueClick('T0002')"></td>
<td id="T0016">T0016 Create Clickbait<input type="checkbox" id="T0016check" onclick="handleTechniqueClick('T0016')"></td>
<td id="T0015">T0015 Create hashtags and search artifacts<input type="checkbox" id="T0015check" onclick="handleTechniqueClick('T0015')"></td>
<td id="T0029">T0029 Online polls<input type="checkbox" id="T0029check" onclick="handleTechniqueClick('T0029')"></td>
<td id="T0020">T0020 Trial content<input type="checkbox" id="T0020check" onclick="handleTechniqueClick('T0020')"></td>
<td id="T0101">T0101 Create Localized Content<input type="checkbox" id="T0101check" onclick="handleTechniqueClick('T0101')"></td>
<td id="T0084">T0084 Reuse Existing Content<input type="checkbox" id="T0084check" onclick="handleTechniqueClick('T0084')"></td>
<td id="T0103">T0103 Livestream<input type="checkbox" id="T0103check" onclick="handleTechniqueClick('T0103')"></td>
<td id="T0113">T0113 Employ Commercial Analytic Firms<input type="checkbox" id="T0113check" onclick="handleTechniqueClick('T0113')"></td>
<td id="T0114">T0114 Deliver Ads<input type="checkbox" id="T0114check" onclick="handleTechniqueClick('T0114')"></td>
<td id="T0017">T0017 Conduct fundraising<input type="checkbox" id="T0017check" onclick="handleTechniqueClick('T0017')"></td>
<td id="T0059">T0059 Play the long game<input type="checkbox" id="T0059check" onclick="handleTechniqueClick('T0059')"></td>
<td id="T0126">T0126 Encourage Attendance at Events<input type="checkbox" id="T0126check" onclick="handleTechniqueClick('T0126')"></td>
<td id="T0131">T0131 Exploit TOS/Content Moderation<input type="checkbox" id="T0131check" onclick="handleTechniqueClick('T0131')"></td>
<td id="T0132">T0132 Measure Performance<input type="checkbox" id="T0132check" onclick="handleTechniqueClick('T0132')"></td>
<td id="T0072">T0072 Segment Audiences<input type="checkbox" id="T0072check" onclick="handleTechniqueClick('T0072')"></td>
<td id="T0003">T0003 Leverage Existing Narratives<input type="checkbox" id="T0003check" onclick="handleTechniqueClick('T0003')"></td>
<td id="T0007">T0007 Create Inauthentic Social Media Pages and Groups<input type="checkbox" id="T0007check" onclick="handleTechniqueClick('T0007')"></td>
<td id="T0009">T0009 Create fake experts<input type="checkbox" id="T0009check" onclick="handleTechniqueClick('T0009')"></td>
<td id="T0049">T0049 Flooding the Information Space<input type="checkbox" id="T0049check" onclick="handleTechniqueClick('T0049')"></td>
<td id="T0047">T0047 Censor social media as a political force<input type="checkbox" id="T0047check" onclick="handleTechniqueClick('T0047')"></td>
<td id="T0080">T0080 Map Target Audience Information Environment<input type="checkbox" id="T0080check" onclick="handleTechniqueClick('T0080')"></td>
<td id="T0082">T0082 Develop New Narratives<input type="checkbox" id="T0082check" onclick="handleTechniqueClick('T0082')"></td>
<td id="T0090">T0090 Create Inauthentic Accounts<input type="checkbox" id="T0090check" onclick="handleTechniqueClick('T0090')"></td>
<td id="T0097">T0097 Create personas<input type="checkbox" id="T0097check" onclick="handleTechniqueClick('T0097')"></td>
<td id="T0118">T0118 Amplify Existing Narrative<input type="checkbox" id="T0118check" onclick="handleTechniqueClick('T0118')"></td>
<td id="T0123">T0123 Control Information Environment through Offensive Cyberspace Operations<input type="checkbox" id="T0123check" onclick="handleTechniqueClick('T0123')"></td>
</tr>
<tr>
<td id="T0074">T0074 Determine Strategic Ends<input type="checkbox" id="T0074check" onclick="handleTechniqueClick('T0074')"></td>
<td id="T0066">T0066 Degrade Adversary<input type="checkbox" id="T0066check" onclick="handleTechniqueClick('T0066')"></td>
<td id="T0018">T0018 Purchase Targeted Advertisements<input type="checkbox" id="T0018check" onclick="handleTechniqueClick('T0018')"></td>
<td id="T0019">T0019 Generate information pollution<input type="checkbox" id="T0019check" onclick="handleTechniqueClick('T0019')"></td>
<td id="T0043">T0043 Chat apps<input type="checkbox" id="T0043check" onclick="handleTechniqueClick('T0043')"></td>
<td id="T0039 ">T0039 Bait legitimate influencers<input type="checkbox" id="T0039 check" onclick="handleTechniqueClick('T0039 ')"></td>
<td id="T0102">T0102 Leverage Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102check" onclick="handleTechniqueClick('T0102')"></td>
<td id="T0085">T0085 Develop Text-based Content<input type="checkbox" id="T0085check" onclick="handleTechniqueClick('T0085')"></td>
<td id="T0104">T0104 Social Networks<input type="checkbox" id="T0104check" onclick="handleTechniqueClick('T0104')"></td>
<td id="T0020">T0020 Trial content<input type="checkbox" id="T0020check" onclick="handleTechniqueClick('T0020')"></td>
<td id="T0115">T0115 Post Content<input type="checkbox" id="T0115check" onclick="handleTechniqueClick('T0115')"></td>
<td id="T0057">T0057 Organize Events<input type="checkbox" id="T0057check" onclick="handleTechniqueClick('T0057')"></td>
<td id="T0060">T0060 Continue to Amplify<input type="checkbox" id="T0060check" onclick="handleTechniqueClick('T0060')"></td>
<td id="T0127">T0127 Physical Violence<input type="checkbox" id="T0127check" onclick="handleTechniqueClick('T0127')"></td>
<td id="T0059">T0059 Play the long game<input type="checkbox" id="T0059check" onclick="handleTechniqueClick('T0059')"></td>
<td id="T0133">T0133 Measure Effectiveness<input type="checkbox" id="T0133check" onclick="handleTechniqueClick('T0133')"></td>
<td id="T0080">T0080 Map Target Audience Information Environment<input type="checkbox" id="T0080check" onclick="handleTechniqueClick('T0080')"></td>
<td id="T0004">T0004 Develop Competing Narratives<input type="checkbox" id="T0004check" onclick="handleTechniqueClick('T0004')"></td>
<td id="T0010">T0010 Cultivate ignorant agents<input type="checkbox" id="T0010check" onclick="handleTechniqueClick('T0010')"></td>
<td id="T0011">T0011 Compromise legitimate accounts<input type="checkbox" id="T0011check" onclick="handleTechniqueClick('T0011')"></td>
<td id="T0118">T0118 Amplify Existing Narrative<input type="checkbox" id="T0118check" onclick="handleTechniqueClick('T0118')"></td>
<td id="T0048">T0048 Harass<input type="checkbox" id="T0048check" onclick="handleTechniqueClick('T0048')"></td>
<td id="T0081">T0081 Identify Social and Technical Vulnerabilities<input type="checkbox" id="T0081check" onclick="handleTechniqueClick('T0081')"></td>
<td id="T0083">T0083 Integrate Target Audience Vulnerabilities into Narrative<input type="checkbox" id="T0083check" onclick="handleTechniqueClick('T0083')"></td>
<td id="T0091">T0091 Recruit bad actors<input type="checkbox" id="T0091check" onclick="handleTechniqueClick('T0091')"></td>
<td id="T0098">T0098 Establish Inauthentic News Sites<input type="checkbox" id="T0098check" onclick="handleTechniqueClick('T0098')"></td>
<td id="T0119">T0119 Cross-Posting<input type="checkbox" id="T0119check" onclick="handleTechniqueClick('T0119')"></td>
<td id="T0124">T0124 Suppress Opposition<input type="checkbox" id="T0124check" onclick="handleTechniqueClick('T0124')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0075">T0075 Dismiss<input type="checkbox" id="T0075check" onclick="handleTechniqueClick('T0075')"></td>
<td id="T0101">T0101 Create Localized Content<input type="checkbox" id="T0101check" onclick="handleTechniqueClick('T0101')"></td>
<td id="T0023">T0023 Distort facts<input type="checkbox" id="T0023check" onclick="handleTechniqueClick('T0023')"></td>
<td id="T0103">T0103 Livestream<input type="checkbox" id="T0103check" onclick="handleTechniqueClick('T0103')"></td>
<td id="T0042">T0042 Seed Kernel of truth<input type="checkbox" id="T0042check" onclick="handleTechniqueClick('T0042')"></td>
<td id="T0016">T0016 Create Clickbait<input type="checkbox" id="T0016check" onclick="handleTechniqueClick('T0016')"></td>
<td id="T0086">T0086 Develop Image-based Content<input type="checkbox" id="T0086check" onclick="handleTechniqueClick('T0086')"></td>
<td id="T0105">T0105 Media Sharing Networks<input type="checkbox" id="T0105check" onclick="handleTechniqueClick('T0105')"></td>
<td id="T0039 ">T0039 Bait legitimate influencers<input type="checkbox" id="T0039 check" onclick="handleTechniqueClick('T0039 ')"></td>
<td id="T0116">T0116 Comment or Reply on Content<input type="checkbox" id="T0116check" onclick="handleTechniqueClick('T0116')"></td>
<td id="T0061">T0061 Sell Merchandise<input type="checkbox" id="T0061check" onclick="handleTechniqueClick('T0061')"></td>
<td id="T0128">T0128 Conceal People<input type="checkbox" id="T0128check" onclick="handleTechniqueClick('T0128')"></td>
<td id="T0017">T0017 Conduct fundraising<input type="checkbox" id="T0017check" onclick="handleTechniqueClick('T0017')"></td>
<td id="T0060">T0060 Continue to Amplify<input type="checkbox" id="T0060check" onclick="handleTechniqueClick('T0060')"></td>
<td id="T0134">T0134 Measure Effectiveness Indicators (or KPIs)<input type="checkbox" id="T0134check" onclick="handleTechniqueClick('T0134')"></td>
<td id="T0081">T0081 Identify Social and Technical Vulnerabilities<input type="checkbox" id="T0081check" onclick="handleTechniqueClick('T0081')"></td>
<td id="T0022">T0022 Leverage Conspiracy Theory Narratives<input type="checkbox" id="T0022check" onclick="handleTechniqueClick('T0022')"></td>
<td id="T0013">T0013 Create inauthentic websites<input type="checkbox" id="T0013check" onclick="handleTechniqueClick('T0013')"></td>
<td id="T0097">T0097 Create personas<input type="checkbox" id="T0097check" onclick="handleTechniqueClick('T0097')"></td>
<td id="T0119">T0119 Cross-Posting<input type="checkbox" id="T0119check" onclick="handleTechniqueClick('T0119')"></td>
<td id="T0123">T0123 Control Information Environment through Offensive Cyberspace Operations<input type="checkbox" id="T0123check" onclick="handleTechniqueClick('T0123')"></td>
<td id="T0072">T0072 Segment Audiences<input type="checkbox" id="T0072check" onclick="handleTechniqueClick('T0072')"></td>
<td id="T0003">T0003 Leverage Existing Narratives<input type="checkbox" id="T0003check" onclick="handleTechniqueClick('T0003')"></td>
<td id="T0092">T0092 Build Network<input type="checkbox" id="T0092check" onclick="handleTechniqueClick('T0092')"></td>
<td id="T0099">T0099 Prepare Assets Impersonating Legitimate Entities<input type="checkbox" id="T0099check" onclick="handleTechniqueClick('T0099')"></td>
<td id="T0120">T0120 Incentivize Sharing<input type="checkbox" id="T0120check" onclick="handleTechniqueClick('T0120')"></td>
<td id="T0125">T0125 Platform Filtering<input type="checkbox" id="T0125check" onclick="handleTechniqueClick('T0125')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0076">T0076 Distort<input type="checkbox" id="T0076check" onclick="handleTechniqueClick('T0076')"></td>
<td id="T0102">T0102 Leverage Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102check" onclick="handleTechniqueClick('T0102')"></td>
<td id="T0084">T0084 Reuse Existing Content<input type="checkbox" id="T0084check" onclick="handleTechniqueClick('T0084')"></td>
<td id="T0104">T0104 Social Networks<input type="checkbox" id="T0104check" onclick="handleTechniqueClick('T0104')"></td>
<td id="T0044">T0044 Seed distortions<input type="checkbox" id="T0044check" onclick="handleTechniqueClick('T0044')"></td>
<td id="T0018">T0018 Purchase Targeted Advertisements<input type="checkbox" id="T0018check" onclick="handleTechniqueClick('T0018')"></td>
<td id="T0087">T0087 Develop Video-based Content<input type="checkbox" id="T0087check" onclick="handleTechniqueClick('T0087')"></td>
<td id="T0106">T0106 Discussion Forums<input type="checkbox" id="T0106check" onclick="handleTechniqueClick('T0106')"></td>
<td id="T0042">T0042 Seed Kernel of truth<input type="checkbox" id="T0042check" onclick="handleTechniqueClick('T0042')"></td>
<td id="T0117">T0117 Attract Traditional Media<input type="checkbox" id="T0117check" onclick="handleTechniqueClick('T0117')"></td>
<td id="T0126">T0126 Encourage Attendance at Events<input type="checkbox" id="T0126check" onclick="handleTechniqueClick('T0126')"></td>
<td id="T0129">T0129 Conceal Operational Activity<input type="checkbox" id="T0129check" onclick="handleTechniqueClick('T0129')"></td>
<td id="T0057">T0057 Organize Events<input type="checkbox" id="T0057check" onclick="handleTechniqueClick('T0057')"></td>
<td id="T0128">T0128 Conceal People<input type="checkbox" id="T0128check" onclick="handleTechniqueClick('T0128')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0040">T0040 Demand insurmountable proof<input type="checkbox" id="T0040check" onclick="handleTechniqueClick('T0040')"></td>
<td id="T0014">T0014 Prepare fundraising campaigns<input type="checkbox" id="T0014check" onclick="handleTechniqueClick('T0014')"></td>
<td id="T0098">T0098 Establish Inauthentic News Sites<input type="checkbox" id="T0098check" onclick="handleTechniqueClick('T0098')"></td>
<td id="T0120">T0120 Incentivize Sharing<input type="checkbox" id="T0120check" onclick="handleTechniqueClick('T0120')"></td>
<td id="T0124">T0124 Suppress Opposition<input type="checkbox" id="T0124check" onclick="handleTechniqueClick('T0124')"></td>
<td id="T0004">T0004 Develop Competing Narratives<input type="checkbox" id="T0004check" onclick="handleTechniqueClick('T0004')"></td>
<td id="T0093">T0093 Acquire/ recruit Network<input type="checkbox" id="T0093check" onclick="handleTechniqueClick('T0093')"></td>
<td id="T0100">T0100 Co-opt Trusted Sources<input type="checkbox" id="T0100check" onclick="handleTechniqueClick('T0100')"></td>
<td id="T0121">T0121 Manipulate Platform Algorithm<input type="checkbox" id="T0121check" onclick="handleTechniqueClick('T0121')"></td>
<td id="T0047">T0047 Censor social media as a political force<input type="checkbox" id="T0047check" onclick="handleTechniqueClick('T0047')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0077">T0077 Distract<input type="checkbox" id="T0077check" onclick="handleTechniqueClick('T0077')"></td>
<td bgcolor=white> </td>
<td id="T0085">T0085 Develop Text-based Content<input type="checkbox" id="T0085check" onclick="handleTechniqueClick('T0085')"></td>
<td id="T0105">T0105 Media Sharing Networks<input type="checkbox" id="T0105check" onclick="handleTechniqueClick('T0105')"></td>
<td id="T0045">T0045 Use fake experts<input type="checkbox" id="T0045check" onclick="handleTechniqueClick('T0045')"></td>
<td id="T0088">T0088 Develop Audio-based Content<input type="checkbox" id="T0088check" onclick="handleTechniqueClick('T0088')"></td>
<td id="T0107">T0107 Bookmarking and Content Curation<input type="checkbox" id="T0107check" onclick="handleTechniqueClick('T0107')"></td>
<td id="T0044">T0044 Seed distortions<input type="checkbox" id="T0044check" onclick="handleTechniqueClick('T0044')"></td>
<td bgcolor=white> </td>
<td id="T0127">T0127 Physical Violence<input type="checkbox" id="T0127check" onclick="handleTechniqueClick('T0127')"></td>
<td id="T0130">T0130 Conceal Infrastructure<input type="checkbox" id="T0130check" onclick="handleTechniqueClick('T0130')"></td>
<td id="T0061">T0061 Sell Merchandise<input type="checkbox" id="T0061check" onclick="handleTechniqueClick('T0061')"></td>
<td id="T0129">T0129 Conceal Operational Activity<input type="checkbox" id="T0129check" onclick="handleTechniqueClick('T0129')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0068">T0068 Respond to Breaking News Event or Active Crisis<input type="checkbox" id="T0068check" onclick="handleTechniqueClick('T0068')"></td>
<td id="T0065">T0065 Prepare Physical Broadcast Capabilities<input type="checkbox" id="T0065check" onclick="handleTechniqueClick('T0065')"></td>
<td id="T0099">T0099 Prepare Assets Impersonating Legitimate Entities<input type="checkbox" id="T0099check" onclick="handleTechniqueClick('T0099')"></td>
<td id="T0121">T0121 Manipulate Platform Algorithm<input type="checkbox" id="T0121check" onclick="handleTechniqueClick('T0121')"></td>
<td id="T0125">T0125 Platform Filtering<input type="checkbox" id="T0125check" onclick="handleTechniqueClick('T0125')"></td>
<td id="T0022">T0022 Leverage Conspiracy Theory Narratives<input type="checkbox" id="T0022check" onclick="handleTechniqueClick('T0022')"></td>
<td id="T0094">T0094 Infiltrate Existing Networks<input type="checkbox" id="T0094check" onclick="handleTechniqueClick('T0094')"></td>
<td id="T0009">T0009 Create fake experts<input type="checkbox" id="T0009check" onclick="handleTechniqueClick('T0009')"></td>
<td id="T0122">T0122 Direct Users to Alternative Platforms<input type="checkbox" id="T0122check" onclick="handleTechniqueClick('T0122')"></td>
<td id="T0048">T0048 Harass<input type="checkbox" id="T0048check" onclick="handleTechniqueClick('T0048')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0078">T0078 Dismay<input type="checkbox" id="T0078check" onclick="handleTechniqueClick('T0078')"></td>
<td bgcolor=white> </td>
<td id="T0086">T0086 Develop Image-based Content<input type="checkbox" id="T0086check" onclick="handleTechniqueClick('T0086')"></td>
<td id="T0106">T0106 Discussion Forums<input type="checkbox" id="T0106check" onclick="handleTechniqueClick('T0106')"></td>
<td id="T0046">T0046 Use Search Engine Optimization<input type="checkbox" id="T0046check" onclick="handleTechniqueClick('T0046')"></td>
<td id="T0089">T0089 Obtain Private Documents<input type="checkbox" id="T0089check" onclick="handleTechniqueClick('T0089')"></td>
<td id="T0108">T0108 Blogging and Publishing Networks<input type="checkbox" id="T0108check" onclick="handleTechniqueClick('T0108')"></td>
<td id="T0045">T0045 Use fake experts<input type="checkbox" id="T0045check" onclick="handleTechniqueClick('T0045')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0131">T0131 Exploit TOS/Content Moderation<input type="checkbox" id="T0131check" onclick="handleTechniqueClick('T0131')"></td>
<td id="T0130">T0130 Conceal Infrastructure<input type="checkbox" id="T0130check" onclick="handleTechniqueClick('T0130')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0082">T0082 Develop New Narratives<input type="checkbox" id="T0082check" onclick="handleTechniqueClick('T0082')"></td>
<td id="T0090">T0090 Create Inauthentic Accounts<input type="checkbox" id="T0090check" onclick="handleTechniqueClick('T0090')"></td>
<td id="T0100">T0100 Co-opt Trusted Sources<input type="checkbox" id="T0100check" onclick="handleTechniqueClick('T0100')"></td>
<td id="T0122">T0122 Direct Users to Alternative Platforms<input type="checkbox" id="T0122check" onclick="handleTechniqueClick('T0122')"></td>
<td id="T0040">T0040 Demand insurmountable proof<input type="checkbox" id="T0040check" onclick="handleTechniqueClick('T0040')"></td>
<td id="T0095">T0095 Develop Owned Media Assets<input type="checkbox" id="T0095check" onclick="handleTechniqueClick('T0095')"></td>
<td id="T0011">T0011 Compromise legitimate accounts<input type="checkbox" id="T0011check" onclick="handleTechniqueClick('T0011')"></td>
<td id="T0049">T0049 Flooding the Information Space<input type="checkbox" id="T0049check" onclick="handleTechniqueClick('T0049')"></td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0079">T0079 Divide<input type="checkbox" id="T0079check" onclick="handleTechniqueClick('T0079')"></td>
<td bgcolor=white> </td>
<td id="T0087">T0087 Develop Video-based Content<input type="checkbox" id="T0087check" onclick="handleTechniqueClick('T0087')"></td>
<td id="T0107">T0107 Bookmarking and Content Curation<input type="checkbox" id="T0107check" onclick="handleTechniqueClick('T0107')"></td>
<td id="T0113">T0113 Employ Commercial Analytic Firms<input type="checkbox" id="T0113check" onclick="handleTechniqueClick('T0113')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0083">T0083 Integrate Target Audience Vulnerabilities into Narrative<input type="checkbox" id="T0083check" onclick="handleTechniqueClick('T0083')"></td>
<td id="T0091">T0091 Recruit bad actors<input type="checkbox" id="T0091check" onclick="handleTechniqueClick('T0091')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0088">T0088 Develop Audio-based Content<input type="checkbox" id="T0088check" onclick="handleTechniqueClick('T0088')"></td>
<td id="T0108">T0108 Blogging and Publishing Networks<input type="checkbox" id="T0108check" onclick="handleTechniqueClick('T0108')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0092">T0092 Build Network<input type="checkbox" id="T0092check" onclick="handleTechniqueClick('T0092')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0089">T0089 Obtain Private Documents<input type="checkbox" id="T0089check" onclick="handleTechniqueClick('T0089')"></td>
<td id="T0015">T0015 Create hashtags and search artifacts<input type="checkbox" id="T0015check" onclick="handleTechniqueClick('T0015')"></td>
<td id="T0109">T0109 Consumer Review Networks<input type="checkbox" id="T0109check" onclick="handleTechniqueClick('T0109')"></td>
<td id="T0046">T0046 Use Search Engine Optimization<input type="checkbox" id="T0046check" onclick="handleTechniqueClick('T0046')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0093">T0093 Acquire/ recruit Network<input type="checkbox" id="T0093check" onclick="handleTechniqueClick('T0093')"></td>
<td id="T0068">T0068 Respond to Breaking News Event or Active Crisis<input type="checkbox" id="T0068check" onclick="handleTechniqueClick('T0068')"></td>
<td id="T0096">T0096 Leverage Content Farm<input type="checkbox" id="T0096check" onclick="handleTechniqueClick('T0096')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -225,7 +189,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0019">T0019 Generate information pollution<input type="checkbox" id="T0019check" onclick="handleTechniqueClick('T0019')"></td>
<td id="T0110">T0110 Formal Diplomatic Channels<input type="checkbox" id="T0110check" onclick="handleTechniqueClick('T0110')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -234,7 +198,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0094">T0094 Infiltrate Existing Networks<input type="checkbox" id="T0094check" onclick="handleTechniqueClick('T0094')"></td>
<td id="T0007">T0007 Create Inauthentic Social Media Pages and Groups<input type="checkbox" id="T0007check" onclick="handleTechniqueClick('T0007')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -243,7 +207,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0023">T0023 Distort facts<input type="checkbox" id="T0023check" onclick="handleTechniqueClick('T0023')"></td>
<td id="T0111">T0111 Traditional Media<input type="checkbox" id="T0111check" onclick="handleTechniqueClick('T0111')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -252,7 +216,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0095">T0095 Develop Owned Media Assets<input type="checkbox" id="T0095check" onclick="handleTechniqueClick('T0095')"></td>
<td id="T0010">T0010 Cultivate ignorant agents<input type="checkbox" id="T0010check" onclick="handleTechniqueClick('T0010')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -270,7 +234,43 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0096">T0096 Leverage Content Farm<input type="checkbox" id="T0096check" onclick="handleTechniqueClick('T0096')"></td>
<td id="T0013">T0013 Create inauthentic websites<input type="checkbox" id="T0013check" onclick="handleTechniqueClick('T0013')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0029">T0029 Online polls<input type="checkbox" id="T0029check" onclick="handleTechniqueClick('T0029')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0014">T0014 Prepare fundraising campaigns<input type="checkbox" id="T0014check" onclick="handleTechniqueClick('T0014')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0043">T0043 Chat apps<input type="checkbox" id="T0043check" onclick="handleTechniqueClick('T0043')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0065">T0065 Prepare Physical Broadcast Capabilities<input type="checkbox" id="T0065check" onclick="handleTechniqueClick('T0065')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -282,102 +282,102 @@ function handleTechniqueClick(box) {
<ul>
<li id="T0073text" style="display:none">T0073: Determine Target Audiences</li>
<li id="T0002text" style="display:none">T0002: Facilitate State Propaganda</li>
<li id="T0016text" style="display:none">T0016: Create Clickbait</li>
<li id="T0015text" style="display:none">T0015: Create hashtags and search artifacts</li>
<li id="T0029text" style="display:none">T0029: Online polls</li>
<li id="T0020text" style="display:none">T0020: Trial content</li>
<li id="T0114text" style="display:none">T0114: Deliver Ads</li>
<li id="T0017text" style="display:none">T0017: Conduct fundraising</li>
<li id="T0059text" style="display:none">T0059: Play the long game</li>
<li id="T0132text" style="display:none">T0132: Measure Performance</li>
<li id="T0072text" style="display:none">T0072: Segment Audiences</li>
<li id="T0003text" style="display:none">T0003: Leverage Existing Narratives</li>
<li id="T0007text" style="display:none">T0007: Create Inauthentic Social Media Pages and Groups</li>
<li id="T0009text" style="display:none">T0009: Create fake experts</li>
<li id="T0049text" style="display:none">T0049: Flooding the Information Space</li>
<li id="T0047text" style="display:none">T0047: Censor social media as a political force</li>
<li id="T0074text" style="display:none">T0074: Determine Strategic Ends</li>
<li id="T0066text" style="display:none">T0066: Degrade Adversary</li>
<li id="T0018text" style="display:none">T0018: Purchase Targeted Advertisements</li>
<li id="T0019text" style="display:none">T0019: Generate information pollution</li>
<li id="T0043text" style="display:none">T0043: Chat apps</li>
<li id="T0039 text" style="display:none">T0039 : Bait legitimate influencers</li>
<li id="T0115text" style="display:none">T0115: Post Content</li>
<li id="T0057text" style="display:none">T0057: Organize Events</li>
<li id="T0060text" style="display:none">T0060: Continue to Amplify</li>
<li id="T0133text" style="display:none">T0133: Measure Effectiveness</li>
<li id="T0080text" style="display:none">T0080: Map Target Audience Information Environment</li>
<li id="T0004text" style="display:none">T0004: Develop Competing Narratives</li>
<li id="T0010text" style="display:none">T0010: Cultivate ignorant agents</li>
<li id="T0011text" style="display:none">T0011: Compromise legitimate accounts</li>
<li id="T0118text" style="display:none">T0118: Amplify Existing Narrative</li>
<li id="T0048text" style="display:none">T0048: Harass</li>
<li id="T0075text" style="display:none">T0075: Dismiss</li>
<li id="T0101text" style="display:none">T0101: Create Localized Content</li>
<li id="T0023text" style="display:none">T0023: Distort facts</li>
<li id="T0103text" style="display:none">T0103: Livestream</li>
<li id="T0042text" style="display:none">T0042: Seed Kernel of truth</li>
<li id="T0116text" style="display:none">T0116: Comment or Reply on Content</li>
<li id="T0061text" style="display:none">T0061: Sell Merchandise</li>
<li id="T0128text" style="display:none">T0128: Conceal People</li>
<li id="T0134text" style="display:none">T0134: Measure Effectiveness Indicators (or KPIs)</li>
<li id="T0081text" style="display:none">T0081: Identify Social and Technical Vulnerabilities</li>
<li id="T0022text" style="display:none">T0022: Leverage Conspiracy Theory Narratives</li>
<li id="T0013text" style="display:none">T0013: Create inauthentic websites</li>
<li id="T0097text" style="display:none">T0097: Create personas</li>
<li id="T0119text" style="display:none">T0119: Cross-Posting</li>
<li id="T0123text" style="display:none">T0123: Control Information Environment through Offensive Cyberspace Operations</li>
<li id="T0076text" style="display:none">T0076: Distort</li>
<li id="T0102text" style="display:none">T0102: Leverage Echo Chambers/Filter Bubbles</li>
<li id="T0084text" style="display:none">T0084: Reuse Existing Content</li>
<li id="T0104text" style="display:none">T0104: Social Networks</li>
<li id="T0044text" style="display:none">T0044: Seed distortions</li>
<li id="T0117text" style="display:none">T0117: Attract Traditional Media</li>
<li id="T0103text" style="display:none">T0103: Livestream</li>
<li id="T0113text" style="display:none">T0113: Employ Commercial Analytic Firms</li>
<li id="T0114text" style="display:none">T0114: Deliver Ads</li>
<li id="T0126text" style="display:none">T0126: Encourage Attendance at Events</li>
<li id="T0129text" style="display:none">T0129: Conceal Operational Activity</li>
<li id="T0040text" style="display:none">T0040: Demand insurmountable proof</li>
<li id="T0014text" style="display:none">T0014: Prepare fundraising campaigns</li>
<li id="T0098text" style="display:none">T0098: Establish Inauthentic News Sites</li>
<li id="T0120text" style="display:none">T0120: Incentivize Sharing</li>
<li id="T0124text" style="display:none">T0124: Suppress Opposition</li>
<li id="T0077text" style="display:none">T0077: Distract</li>
<li id="T0085text" style="display:none">T0085: Develop Text-based Content</li>
<li id="T0105text" style="display:none">T0105: Media Sharing Networks</li>
<li id="T0045text" style="display:none">T0045: Use fake experts</li>
<li id="T0127text" style="display:none">T0127: Physical Violence</li>
<li id="T0130text" style="display:none">T0130: Conceal Infrastructure</li>
<li id="T0068text" style="display:none">T0068: Respond to Breaking News Event or Active Crisis</li>
<li id="T0065text" style="display:none">T0065: Prepare Physical Broadcast Capabilities</li>
<li id="T0099text" style="display:none">T0099: Prepare Assets Impersonating Legitimate Entities</li>
<li id="T0121text" style="display:none">T0121: Manipulate Platform Algorithm</li>
<li id="T0125text" style="display:none">T0125: Platform Filtering</li>
<li id="T0078text" style="display:none">T0078: Dismay</li>
<li id="T0086text" style="display:none">T0086: Develop Image-based Content</li>
<li id="T0106text" style="display:none">T0106: Discussion Forums</li>
<li id="T0046text" style="display:none">T0046: Use Search Engine Optimization</li>
<li id="T0131text" style="display:none">T0131: Exploit TOS/Content Moderation</li>
<li id="T0132text" style="display:none">T0132: Measure Performance</li>
<li id="T0080text" style="display:none">T0080: Map Target Audience Information Environment</li>
<li id="T0082text" style="display:none">T0082: Develop New Narratives</li>
<li id="T0090text" style="display:none">T0090: Create Inauthentic Accounts</li>
<li id="T0100text" style="display:none">T0100: Co-opt Trusted Sources</li>
<li id="T0122text" style="display:none">T0122: Direct Users to Alternative Platforms</li>
<li id="T0079text" style="display:none">T0079: Divide</li>
<li id="T0087text" style="display:none">T0087: Develop Video-based Content</li>
<li id="T0107text" style="display:none">T0107: Bookmarking and Content Curation</li>
<li id="T0113text" style="display:none">T0113: Employ Commercial Analytic Firms</li>
<li id="T0097text" style="display:none">T0097: Create personas</li>
<li id="T0118text" style="display:none">T0118: Amplify Existing Narrative</li>
<li id="T0123text" style="display:none">T0123: Control Information Environment through Offensive Cyberspace Operations</li>
<li id="T0074text" style="display:none">T0074: Determine Strategic Ends</li>
<li id="T0066text" style="display:none">T0066: Degrade Adversary</li>
<li id="T0102text" style="display:none">T0102: Leverage Echo Chambers/Filter Bubbles</li>
<li id="T0085text" style="display:none">T0085: Develop Text-based Content</li>
<li id="T0104text" style="display:none">T0104: Social Networks</li>
<li id="T0020text" style="display:none">T0020: Trial content</li>
<li id="T0115text" style="display:none">T0115: Post Content</li>
<li id="T0127text" style="display:none">T0127: Physical Violence</li>
<li id="T0059text" style="display:none">T0059: Play the long game</li>
<li id="T0133text" style="display:none">T0133: Measure Effectiveness</li>
<li id="T0081text" style="display:none">T0081: Identify Social and Technical Vulnerabilities</li>
<li id="T0083text" style="display:none">T0083: Integrate Target Audience Vulnerabilities into Narrative</li>
<li id="T0091text" style="display:none">T0091: Recruit bad actors</li>
<li id="T0088text" style="display:none">T0088: Develop Audio-based Content</li>
<li id="T0108text" style="display:none">T0108: Blogging and Publishing Networks</li>
<li id="T0098text" style="display:none">T0098: Establish Inauthentic News Sites</li>
<li id="T0119text" style="display:none">T0119: Cross-Posting</li>
<li id="T0124text" style="display:none">T0124: Suppress Opposition</li>
<li id="T0075text" style="display:none">T0075: Dismiss</li>
<li id="T0016text" style="display:none">T0016: Create Clickbait</li>
<li id="T0086text" style="display:none">T0086: Develop Image-based Content</li>
<li id="T0105text" style="display:none">T0105: Media Sharing Networks</li>
<li id="T0039 text" style="display:none">T0039 : Bait legitimate influencers</li>
<li id="T0116text" style="display:none">T0116: Comment or Reply on Content</li>
<li id="T0017text" style="display:none">T0017: Conduct fundraising</li>
<li id="T0060text" style="display:none">T0060: Continue to Amplify</li>
<li id="T0134text" style="display:none">T0134: Measure Effectiveness Indicators (or KPIs)</li>
<li id="T0072text" style="display:none">T0072: Segment Audiences</li>
<li id="T0003text" style="display:none">T0003: Leverage Existing Narratives</li>
<li id="T0092text" style="display:none">T0092: Build Network</li>
<li id="T0089text" style="display:none">T0089: Obtain Private Documents</li>
<li id="T0109text" style="display:none">T0109: Consumer Review Networks</li>
<li id="T0099text" style="display:none">T0099: Prepare Assets Impersonating Legitimate Entities</li>
<li id="T0120text" style="display:none">T0120: Incentivize Sharing</li>
<li id="T0125text" style="display:none">T0125: Platform Filtering</li>
<li id="T0076text" style="display:none">T0076: Distort</li>
<li id="T0018text" style="display:none">T0018: Purchase Targeted Advertisements</li>
<li id="T0087text" style="display:none">T0087: Develop Video-based Content</li>
<li id="T0106text" style="display:none">T0106: Discussion Forums</li>
<li id="T0042text" style="display:none">T0042: Seed Kernel of truth</li>
<li id="T0117text" style="display:none">T0117: Attract Traditional Media</li>
<li id="T0057text" style="display:none">T0057: Organize Events</li>
<li id="T0128text" style="display:none">T0128: Conceal People</li>
<li id="T0004text" style="display:none">T0004: Develop Competing Narratives</li>
<li id="T0093text" style="display:none">T0093: Acquire/ recruit Network</li>
<li id="T0110text" style="display:none">T0110: Formal Diplomatic Channels</li>
<li id="T0100text" style="display:none">T0100: Co-opt Trusted Sources</li>
<li id="T0121text" style="display:none">T0121: Manipulate Platform Algorithm</li>
<li id="T0047text" style="display:none">T0047: Censor social media as a political force</li>
<li id="T0077text" style="display:none">T0077: Distract</li>
<li id="T0088text" style="display:none">T0088: Develop Audio-based Content</li>
<li id="T0107text" style="display:none">T0107: Bookmarking and Content Curation</li>
<li id="T0044text" style="display:none">T0044: Seed distortions</li>
<li id="T0061text" style="display:none">T0061: Sell Merchandise</li>
<li id="T0129text" style="display:none">T0129: Conceal Operational Activity</li>
<li id="T0022text" style="display:none">T0022: Leverage Conspiracy Theory Narratives</li>
<li id="T0094text" style="display:none">T0094: Infiltrate Existing Networks</li>
<li id="T0111text" style="display:none">T0111: Traditional Media</li>
<li id="T0009text" style="display:none">T0009: Create fake experts</li>
<li id="T0122text" style="display:none">T0122: Direct Users to Alternative Platforms</li>
<li id="T0048text" style="display:none">T0048: Harass</li>
<li id="T0078text" style="display:none">T0078: Dismay</li>
<li id="T0089text" style="display:none">T0089: Obtain Private Documents</li>
<li id="T0108text" style="display:none">T0108: Blogging and Publishing Networks</li>
<li id="T0045text" style="display:none">T0045: Use fake experts</li>
<li id="T0130text" style="display:none">T0130: Conceal Infrastructure</li>
<li id="T0040text" style="display:none">T0040: Demand insurmountable proof</li>
<li id="T0095text" style="display:none">T0095: Develop Owned Media Assets</li>
<li id="T0112text" style="display:none">T0112: Email</li>
<li id="T0011text" style="display:none">T0011: Compromise legitimate accounts</li>
<li id="T0049text" style="display:none">T0049: Flooding the Information Space</li>
<li id="T0079text" style="display:none">T0079: Divide</li>
<li id="T0015text" style="display:none">T0015: Create hashtags and search artifacts</li>
<li id="T0109text" style="display:none">T0109: Consumer Review Networks</li>
<li id="T0046text" style="display:none">T0046: Use Search Engine Optimization</li>
<li id="T0068text" style="display:none">T0068: Respond to Breaking News Event or Active Crisis</li>
<li id="T0096text" style="display:none">T0096: Leverage Content Farm</li>
<li id="T0019text" style="display:none">T0019: Generate information pollution</li>
<li id="T0110text" style="display:none">T0110: Formal Diplomatic Channels</li>
<li id="T0007text" style="display:none">T0007: Create Inauthentic Social Media Pages and Groups</li>
<li id="T0023text" style="display:none">T0023: Distort facts</li>
<li id="T0111text" style="display:none">T0111: Traditional Media</li>
<li id="T0010text" style="display:none">T0010: Cultivate ignorant agents</li>
<li id="T0112text" style="display:none">T0112: Email</li>
<li id="T0013text" style="display:none">T0013: Create inauthentic websites</li>
<li id="T0029text" style="display:none">T0029: Online polls</li>
<li id="T0014text" style="display:none">T0014: Prepare fundraising campaigns</li>
<li id="T0043text" style="display:none">T0043: Chat apps</li>
<li id="T0065text" style="display:none">T0065: Prepare Physical Broadcast Capabilities</li>
</ul>
</body>

View File

@ -1,14 +1,14 @@
P01,P01,P02,P02,P02,P03,P03,P03,P03,P04,P01,P02,P02,P02,P03,P03
TA01,TA02,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16,TA17,TA18
T0073,T0002,T0016,T0015,T0029,T0020,T0114,T0017,T0059,T0132,T0072,T0003,T0007,T0009,T0049,T0047
T0074,T0066,T0018,T0019,T0043,T0039 ,T0115,T0057,T0060,T0133,T0080,T0004,T0010,T0011,T0118,T0048
,T0075,T0101,T0023,T0103,T0042,T0116,T0061,T0128,T0134,T0081,T0022,T0013,T0097,T0119,T0123
,T0076,T0102,T0084,T0104,T0044,T0117,T0126,T0129,,,T0040,T0014,T0098,T0120,T0124
,T0077,,T0085,T0105,T0045,,T0127,T0130,,,T0068,T0065,T0099,T0121,T0125
,T0078,,T0086,T0106,T0046,,,T0131,,,T0082,T0090,T0100,T0122,
,T0079,,T0087,T0107,T0113,,,,,,T0083,T0091,,,
,,,T0088,T0108,,,,,,,,T0092,,,
,,,T0089,T0109,,,,,,,,T0093,,,
,,,,T0110,,,,,,,,T0094,,,
,,,,T0111,,,,,,,,T0095,,,
,,,,T0112,,,,,,,,T0096,,,
T0073,T0002,T0101,T0084,T0103,T0113,T0114,T0126,T0131,T0132,T0080,T0082,T0090,T0097,T0118,T0123
T0074,T0066,T0102,T0085,T0104,T0020,T0115,T0127,T0059,T0133,T0081,T0083,T0091,T0098,T0119,T0124
,T0075,T0016,T0086,T0105,T0039 ,T0116,T0017,T0060,T0134,T0072,T0003,T0092,T0099,T0120,T0125
,T0076,T0018,T0087,T0106,T0042,T0117,T0057,T0128,,,T0004,T0093,T0100,T0121,T0047
,T0077,,T0088,T0107,T0044,,T0061,T0129,,,T0022,T0094,T0009,T0122,T0048
,T0078,,T0089,T0108,T0045,,,T0130,,,T0040,T0095,T0011,T0049,
,T0079,,T0015,T0109,T0046,,,,,,T0068,T0096,,,
,,,T0019,T0110,,,,,,,,T0007,,,
,,,T0023,T0111,,,,,,,,T0010,,,
,,,,T0112,,,,,,,,T0013,,,
,,,,T0029,,,,,,,,T0014,,,
,,,,T0043,,,,,,,,T0065,,,

1 P01 P01 P02 P02 P02 P03 P03 P03 P03 P04 P01 P02 P02 P02 P03 P03
2 TA01 TA02 TA05 TA06 TA07 TA08 TA09 TA10 TA11 TA12 TA13 TA14 TA15 TA16 TA17 TA18
3 T0073 T0002 T0016 T0101 T0015 T0084 T0029 T0103 T0020 T0113 T0114 T0017 T0126 T0059 T0131 T0132 T0072 T0080 T0003 T0082 T0007 T0090 T0009 T0097 T0049 T0118 T0047 T0123
4 T0074 T0066 T0018 T0102 T0019 T0085 T0043 T0104 T0039 T0020 T0115 T0057 T0127 T0060 T0059 T0133 T0080 T0081 T0004 T0083 T0010 T0091 T0011 T0098 T0118 T0119 T0048 T0124
5 T0075 T0101 T0016 T0023 T0086 T0103 T0105 T0042 T0039 T0116 T0061 T0017 T0128 T0060 T0134 T0081 T0072 T0022 T0003 T0013 T0092 T0097 T0099 T0119 T0120 T0123 T0125
6 T0076 T0102 T0018 T0084 T0087 T0104 T0106 T0044 T0042 T0117 T0126 T0057 T0129 T0128 T0040 T0004 T0014 T0093 T0098 T0100 T0120 T0121 T0124 T0047
7 T0077 T0085 T0088 T0105 T0107 T0045 T0044 T0127 T0061 T0130 T0129 T0068 T0022 T0065 T0094 T0099 T0009 T0121 T0122 T0125 T0048
8 T0078 T0086 T0089 T0106 T0108 T0046 T0045 T0131 T0130 T0082 T0040 T0090 T0095 T0100 T0011 T0122 T0049
9 T0079 T0087 T0015 T0107 T0109 T0113 T0046 T0083 T0068 T0091 T0096
10 T0088 T0019 T0108 T0110 T0092 T0007
11 T0089 T0023 T0109 T0111 T0093 T0010
12 T0110 T0112 T0094 T0013
13 T0111 T0029 T0095 T0014
14 T0112 T0043 T0096 T0065

BIN
generated_pages/.DS_Store vendored Normal file

Binary file not shown.

View File

@ -23,161 +23,125 @@
<tr>
<td><a href="techniques/T0073.md">T0073 Determine Target Audiences</a></td>
<td><a href="techniques/T0002.md">T0002 Facilitate State Propaganda</a></td>
<td><a href="techniques/T0016.md">T0016 Create Clickbait</a></td>
<td><a href="techniques/T0015.md">T0015 Create hashtags and search artifacts</a></td>
<td><a href="techniques/T0029.md">T0029 Online polls</a></td>
<td><a href="techniques/T0020.md">T0020 Trial content</a></td>
<td><a href="techniques/T0101.md">T0101 Create Localized Content</a></td>
<td><a href="techniques/T0084.md">T0084 Reuse Existing Content</a></td>
<td><a href="techniques/T0103.md">T0103 Livestream</a></td>
<td><a href="techniques/T0113.md">T0113 Employ Commercial Analytic Firms</a></td>
<td><a href="techniques/T0114.md">T0114 Deliver Ads</a></td>
<td><a href="techniques/T0017.md">T0017 Conduct fundraising</a></td>
<td><a href="techniques/T0059.md">T0059 Play the long game</a></td>
<td><a href="techniques/T0126.md">T0126 Encourage Attendance at Events</a></td>
<td><a href="techniques/T0131.md">T0131 Exploit TOS/Content Moderation</a></td>
<td><a href="techniques/T0132.md">T0132 Measure Performance</a></td>
<td><a href="techniques/T0072.md">T0072 Segment Audiences</a></td>
<td><a href="techniques/T0003.md">T0003 Leverage Existing Narratives</a></td>
<td><a href="techniques/T0007.md">T0007 Create Inauthentic Social Media Pages and Groups</a></td>
<td><a href="techniques/T0009.md">T0009 Create fake experts</a></td>
<td><a href="techniques/T0049.md">T0049 Flooding the Information Space</a></td>
<td><a href="techniques/T0047.md">T0047 Censor social media as a political force</a></td>
<td><a href="techniques/T0080.md">T0080 Map Target Audience Information Environment</a></td>
<td><a href="techniques/T0082.md">T0082 Develop New Narratives</a></td>
<td><a href="techniques/T0090.md">T0090 Create Inauthentic Accounts</a></td>
<td><a href="techniques/T0097.md">T0097 Create personas</a></td>
<td><a href="techniques/T0118.md">T0118 Amplify Existing Narrative</a></td>
<td><a href="techniques/T0123.md">T0123 Control Information Environment through Offensive Cyberspace Operations</a></td>
</tr>
<tr>
<td><a href="techniques/T0074.md">T0074 Determine Strategic Ends</a></td>
<td><a href="techniques/T0066.md">T0066 Degrade Adversary</a></td>
<td><a href="techniques/T0018.md">T0018 Purchase Targeted Advertisements</a></td>
<td><a href="techniques/T0019.md">T0019 Generate information pollution</a></td>
<td><a href="techniques/T0043.md">T0043 Chat apps</a></td>
<td><a href="techniques/T0039 .md">T0039 Bait legitimate influencers</a></td>
<td><a href="techniques/T0102.md">T0102 Leverage Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0085.md">T0085 Develop Text-based Content</a></td>
<td><a href="techniques/T0104.md">T0104 Social Networks</a></td>
<td><a href="techniques/T0020.md">T0020 Trial content</a></td>
<td><a href="techniques/T0115.md">T0115 Post Content</a></td>
<td><a href="techniques/T0057.md">T0057 Organize Events</a></td>
<td><a href="techniques/T0060.md">T0060 Continue to Amplify</a></td>
<td><a href="techniques/T0127.md">T0127 Physical Violence</a></td>
<td><a href="techniques/T0059.md">T0059 Play the long game</a></td>
<td><a href="techniques/T0133.md">T0133 Measure Effectiveness</a></td>
<td><a href="techniques/T0080.md">T0080 Map Target Audience Information Environment</a></td>
<td><a href="techniques/T0004.md">T0004 Develop Competing Narratives</a></td>
<td><a href="techniques/T0010.md">T0010 Cultivate ignorant agents</a></td>
<td><a href="techniques/T0011.md">T0011 Compromise legitimate accounts</a></td>
<td><a href="techniques/T0118.md">T0118 Amplify Existing Narrative</a></td>
<td><a href="techniques/T0048.md">T0048 Harass</a></td>
<td><a href="techniques/T0081.md">T0081 Identify Social and Technical Vulnerabilities</a></td>
<td><a href="techniques/T0083.md">T0083 Integrate Target Audience Vulnerabilities into Narrative</a></td>
<td><a href="techniques/T0091.md">T0091 Recruit bad actors</a></td>
<td><a href="techniques/T0098.md">T0098 Establish Inauthentic News Sites</a></td>
<td><a href="techniques/T0119.md">T0119 Cross-Posting</a></td>
<td><a href="techniques/T0124.md">T0124 Suppress Opposition</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0075.md">T0075 Dismiss</a></td>
<td><a href="techniques/T0101.md">T0101 Create Localized Content</a></td>
<td><a href="techniques/T0023.md">T0023 Distort facts</a></td>
<td><a href="techniques/T0103.md">T0103 Livestream</a></td>
<td><a href="techniques/T0042.md">T0042 Seed Kernel of truth</a></td>
<td><a href="techniques/T0016.md">T0016 Create Clickbait</a></td>
<td><a href="techniques/T0086.md">T0086 Develop Image-based Content</a></td>
<td><a href="techniques/T0105.md">T0105 Media Sharing Networks</a></td>
<td><a href="techniques/T0039 .md">T0039 Bait legitimate influencers</a></td>
<td><a href="techniques/T0116.md">T0116 Comment or Reply on Content</a></td>
<td><a href="techniques/T0061.md">T0061 Sell Merchandise</a></td>
<td><a href="techniques/T0128.md">T0128 Conceal People</a></td>
<td><a href="techniques/T0017.md">T0017 Conduct fundraising</a></td>
<td><a href="techniques/T0060.md">T0060 Continue to Amplify</a></td>
<td><a href="techniques/T0134.md">T0134 Measure Effectiveness Indicators (or KPIs)</a></td>
<td><a href="techniques/T0081.md">T0081 Identify Social and Technical Vulnerabilities</a></td>
<td><a href="techniques/T0022.md">T0022 Leverage Conspiracy Theory Narratives</a></td>
<td><a href="techniques/T0013.md">T0013 Create inauthentic websites</a></td>
<td><a href="techniques/T0097.md">T0097 Create personas</a></td>
<td><a href="techniques/T0119.md">T0119 Cross-Posting</a></td>
<td><a href="techniques/T0123.md">T0123 Control Information Environment through Offensive Cyberspace Operations</a></td>
<td><a href="techniques/T0072.md">T0072 Segment Audiences</a></td>
<td><a href="techniques/T0003.md">T0003 Leverage Existing Narratives</a></td>
<td><a href="techniques/T0092.md">T0092 Build Network</a></td>
<td><a href="techniques/T0099.md">T0099 Prepare Assets Impersonating Legitimate Entities</a></td>
<td><a href="techniques/T0120.md">T0120 Incentivize Sharing</a></td>
<td><a href="techniques/T0125.md">T0125 Platform Filtering</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0076.md">T0076 Distort</a></td>
<td><a href="techniques/T0102.md">T0102 Leverage Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0084.md">T0084 Reuse Existing Content</a></td>
<td><a href="techniques/T0104.md">T0104 Social Networks</a></td>
<td><a href="techniques/T0044.md">T0044 Seed distortions</a></td>
<td><a href="techniques/T0018.md">T0018 Purchase Targeted Advertisements</a></td>
<td><a href="techniques/T0087.md">T0087 Develop Video-based Content</a></td>
<td><a href="techniques/T0106.md">T0106 Discussion Forums</a></td>
<td><a href="techniques/T0042.md">T0042 Seed Kernel of truth</a></td>
<td><a href="techniques/T0117.md">T0117 Attract Traditional Media</a></td>
<td><a href="techniques/T0126.md">T0126 Encourage Attendance at Events</a></td>
<td><a href="techniques/T0129.md">T0129 Conceal Operational Activity</a></td>
<td><a href="techniques/T0057.md">T0057 Organize Events</a></td>
<td><a href="techniques/T0128.md">T0128 Conceal People</a></td>
<td> </td>
<td> </td>
<td><a href="techniques/T0040.md">T0040 Demand insurmountable proof</a></td>
<td><a href="techniques/T0014.md">T0014 Prepare fundraising campaigns</a></td>
<td><a href="techniques/T0098.md">T0098 Establish Inauthentic News Sites</a></td>
<td><a href="techniques/T0120.md">T0120 Incentivize Sharing</a></td>
<td><a href="techniques/T0124.md">T0124 Suppress Opposition</a></td>
<td><a href="techniques/T0004.md">T0004 Develop Competing Narratives</a></td>
<td><a href="techniques/T0093.md">T0093 Acquire/ recruit Network</a></td>
<td><a href="techniques/T0100.md">T0100 Co-opt Trusted Sources</a></td>
<td><a href="techniques/T0121.md">T0121 Manipulate Platform Algorithm</a></td>
<td><a href="techniques/T0047.md">T0047 Censor social media as a political force</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0077.md">T0077 Distract</a></td>
<td> </td>
<td><a href="techniques/T0085.md">T0085 Develop Text-based Content</a></td>
<td><a href="techniques/T0105.md">T0105 Media Sharing Networks</a></td>
<td><a href="techniques/T0045.md">T0045 Use fake experts</a></td>
<td><a href="techniques/T0088.md">T0088 Develop Audio-based Content</a></td>
<td><a href="techniques/T0107.md">T0107 Bookmarking and Content Curation</a></td>
<td><a href="techniques/T0044.md">T0044 Seed distortions</a></td>
<td> </td>
<td><a href="techniques/T0127.md">T0127 Physical Violence</a></td>
<td><a href="techniques/T0130.md">T0130 Conceal Infrastructure</a></td>
<td><a href="techniques/T0061.md">T0061 Sell Merchandise</a></td>
<td><a href="techniques/T0129.md">T0129 Conceal Operational Activity</a></td>
<td> </td>
<td> </td>
<td><a href="techniques/T0068.md">T0068 Respond to Breaking News Event or Active Crisis</a></td>
<td><a href="techniques/T0065.md">T0065 Prepare Physical Broadcast Capabilities</a></td>
<td><a href="techniques/T0099.md">T0099 Prepare Assets Impersonating Legitimate Entities</a></td>
<td><a href="techniques/T0121.md">T0121 Manipulate Platform Algorithm</a></td>
<td><a href="techniques/T0125.md">T0125 Platform Filtering</a></td>
<td><a href="techniques/T0022.md">T0022 Leverage Conspiracy Theory Narratives</a></td>
<td><a href="techniques/T0094.md">T0094 Infiltrate Existing Networks</a></td>
<td><a href="techniques/T0009.md">T0009 Create fake experts</a></td>
<td><a href="techniques/T0122.md">T0122 Direct Users to Alternative Platforms</a></td>
<td><a href="techniques/T0048.md">T0048 Harass</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0078.md">T0078 Dismay</a></td>
<td> </td>
<td><a href="techniques/T0086.md">T0086 Develop Image-based Content</a></td>
<td><a href="techniques/T0106.md">T0106 Discussion Forums</a></td>
<td><a href="techniques/T0046.md">T0046 Use Search Engine Optimization</a></td>
<td><a href="techniques/T0089.md">T0089 Obtain Private Documents</a></td>
<td><a href="techniques/T0108.md">T0108 Blogging and Publishing Networks</a></td>
<td><a href="techniques/T0045.md">T0045 Use fake experts</a></td>
<td> </td>
<td> </td>
<td><a href="techniques/T0131.md">T0131 Exploit TOS/Content Moderation</a></td>
<td><a href="techniques/T0130.md">T0130 Conceal Infrastructure</a></td>
<td> </td>
<td> </td>
<td><a href="techniques/T0082.md">T0082 Develop New Narratives</a></td>
<td><a href="techniques/T0090.md">T0090 Create Inauthentic Accounts</a></td>
<td><a href="techniques/T0100.md">T0100 Co-opt Trusted Sources</a></td>
<td><a href="techniques/T0122.md">T0122 Direct Users to Alternative Platforms</a></td>
<td><a href="techniques/T0040.md">T0040 Demand insurmountable proof</a></td>
<td><a href="techniques/T0095.md">T0095 Develop Owned Media Assets</a></td>
<td><a href="techniques/T0011.md">T0011 Compromise legitimate accounts</a></td>
<td><a href="techniques/T0049.md">T0049 Flooding the Information Space</a></td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0079.md">T0079 Divide</a></td>
<td> </td>
<td><a href="techniques/T0087.md">T0087 Develop Video-based Content</a></td>
<td><a href="techniques/T0107.md">T0107 Bookmarking and Content Curation</a></td>
<td><a href="techniques/T0113.md">T0113 Employ Commercial Analytic Firms</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0083.md">T0083 Integrate Target Audience Vulnerabilities into Narrative</a></td>
<td><a href="techniques/T0091.md">T0091 Recruit bad actors</a></td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0088.md">T0088 Develop Audio-based Content</a></td>
<td><a href="techniques/T0108.md">T0108 Blogging and Publishing Networks</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0092.md">T0092 Build Network</a></td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0089.md">T0089 Obtain Private Documents</a></td>
<td><a href="techniques/T0015.md">T0015 Create hashtags and search artifacts</a></td>
<td><a href="techniques/T0109.md">T0109 Consumer Review Networks</a></td>
<td><a href="techniques/T0046.md">T0046 Use Search Engine Optimization</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0093.md">T0093 Acquire/ recruit Network</a></td>
<td><a href="techniques/T0068.md">T0068 Respond to Breaking News Event or Active Crisis</a></td>
<td><a href="techniques/T0096.md">T0096 Leverage Content Farm</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -186,7 +150,7 @@
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0019.md">T0019 Generate information pollution</a></td>
<td><a href="techniques/T0110.md">T0110 Formal Diplomatic Channels</a></td>
<td> </td>
<td> </td>
@ -195,7 +159,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0094.md">T0094 Infiltrate Existing Networks</a></td>
<td><a href="techniques/T0007.md">T0007 Create Inauthentic Social Media Pages and Groups</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -204,7 +168,7 @@
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0023.md">T0023 Distort facts</a></td>
<td><a href="techniques/T0111.md">T0111 Traditional Media</a></td>
<td> </td>
<td> </td>
@ -213,7 +177,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0095.md">T0095 Develop Owned Media Assets</a></td>
<td><a href="techniques/T0010.md">T0010 Cultivate ignorant agents</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -231,7 +195,43 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0096.md">T0096 Leverage Content Farm</a></td>
<td><a href="techniques/T0013.md">T0013 Create inauthentic websites</a></td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0029.md">T0029 Online polls</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0014.md">T0014 Prepare fundraising campaigns</a></td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0043.md">T0043 Chat apps</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0065.md">T0065 Prepare Physical Broadcast Capabilities</a></td>
<td> </td>
<td> </td>
<td> </td>

View File

@ -17,8 +17,8 @@
| Techniques |
| ---------- |
| [T0073 Determine Target Audiences](../generated_pages/techniques/T0073.md) |
| [T0074 Determine Strategic Ends](../generated_pages/techniques/T0074.md) |
| [T0073 Determine Target Audiences](techniques/T0073.md) |
| [T0074 Determine Strategic Ends](techniques/T0074.md) |

View File

@ -24,13 +24,13 @@
| Techniques |
| ---------- |
| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) |
| [T0066 Degrade Adversary](../generated_pages/techniques/T0066.md) |
| [T0075 Dismiss](../generated_pages/techniques/T0075.md) |
| [T0076 Distort](../generated_pages/techniques/T0076.md) |
| [T0077 Distract](../generated_pages/techniques/T0077.md) |
| [T0078 Dismay](../generated_pages/techniques/T0078.md) |
| [T0079 Divide](../generated_pages/techniques/T0079.md) |
| [T0002 Facilitate State Propaganda](techniques/T0002.md) |
| [T0066 Degrade Adversary](techniques/T0066.md) |
| [T0075 Dismiss](techniques/T0075.md) |
| [T0076 Distort](techniques/T0076.md) |
| [T0077 Distract](techniques/T0077.md) |
| [T0078 Dismay](techniques/T0078.md) |
| [T0079 Divide](techniques/T0079.md) |

View File

@ -14,10 +14,10 @@
| Techniques |
| ---------- |
| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) |
| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) |
| [T0101 Create Localized Content](../generated_pages/techniques/T0101.md) |
| [T0102 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0102.md) |
| [T0016 Create Clickbait](techniques/T0016.md) |
| [T0018 Purchase Targeted Advertisements](techniques/T0018.md) |
| [T0101 Create Localized Content](techniques/T0101.md) |
| [T0102 Leverage Echo Chambers/Filter Bubbles](techniques/T0102.md) |

View File

@ -1,6 +1,6 @@
# Tactic TA06: Develop Content
* **Summary:** TBD
* **Summary:** Create or acquire text, images, and other content
* **Belongs to phase:** P02
@ -16,15 +16,15 @@
| Techniques |
| ---------- |
| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) |
| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) |
| [T0023 Distort facts](../generated_pages/techniques/T0023.md) |
| [T0084 Reuse Existing Content](../generated_pages/techniques/T0084.md) |
| [T0085 Develop Text-based Content](../generated_pages/techniques/T0085.md) |
| [T0086 Develop Image-based Content](../generated_pages/techniques/T0086.md) |
| [T0087 Develop Video-based Content](../generated_pages/techniques/T0087.md) |
| [T0088 Develop Audio-based Content](../generated_pages/techniques/T0088.md) |
| [T0089 Obtain Private Documents](../generated_pages/techniques/T0089.md) |
| [T0015 Create hashtags and search artifacts](techniques/T0015.md) |
| [T0019 Generate information pollution](techniques/T0019.md) |
| [T0023 Distort facts](techniques/T0023.md) |
| [T0084 Reuse Existing Content](techniques/T0084.md) |
| [T0085 Develop Text-based Content](techniques/T0085.md) |
| [T0086 Develop Image-based Content](techniques/T0086.md) |
| [T0087 Develop Video-based Content](techniques/T0087.md) |
| [T0088 Develop Audio-based Content](techniques/T0088.md) |
| [T0089 Obtain Private Documents](techniques/T0089.md) |

View File

@ -14,18 +14,18 @@
| Techniques |
| ---------- |
| [T0029 Online polls](../generated_pages/techniques/T0029.md) |
| [T0043 Chat apps](../generated_pages/techniques/T0043.md) |
| [T0103 Livestream](../generated_pages/techniques/T0103.md) |
| [T0104 Social Networks](../generated_pages/techniques/T0104.md) |
| [T0105 Media Sharing Networks](../generated_pages/techniques/T0105.md) |
| [T0106 Discussion Forums](../generated_pages/techniques/T0106.md) |
| [T0107 Bookmarking and Content Curation](../generated_pages/techniques/T0107.md) |
| [T0108 Blogging and Publishing Networks](../generated_pages/techniques/T0108.md) |
| [T0109 Consumer Review Networks](../generated_pages/techniques/T0109.md) |
| [T0110 Formal Diplomatic Channels](../generated_pages/techniques/T0110.md) |
| [T0111 Traditional Media](../generated_pages/techniques/T0111.md) |
| [T0112 Email](../generated_pages/techniques/T0112.md) |
| [T0029 Online polls](techniques/T0029.md) |
| [T0043 Chat apps](techniques/T0043.md) |
| [T0103 Livestream](techniques/T0103.md) |
| [T0104 Social Networks](techniques/T0104.md) |
| [T0105 Media Sharing Networks](techniques/T0105.md) |
| [T0106 Discussion Forums](techniques/T0106.md) |
| [T0107 Bookmarking and Content Curation](techniques/T0107.md) |
| [T0108 Blogging and Publishing Networks](techniques/T0108.md) |
| [T0109 Consumer Review Networks](techniques/T0109.md) |
| [T0110 Formal Diplomatic Channels](techniques/T0110.md) |
| [T0111 Traditional Media](techniques/T0111.md) |
| [T0112 Email](techniques/T0112.md) |

View File

@ -16,13 +16,13 @@
| Techniques |
| ---------- |
| [T0020 Trial content](../generated_pages/techniques/T0020.md) |
| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039 .md) |
| [T0042 Seed Kernel of truth](../generated_pages/techniques/T0042.md) |
| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) |
| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) |
| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) |
| [T0113 Employ Commercial Analytic Firms](../generated_pages/techniques/T0113.md) |
| [T0020 Trial content](techniques/T0020.md) |
| [T0039 Bait legitimate influencers](techniques/T0039 .md) |
| [T0042 Seed Kernel of truth](techniques/T0042.md) |
| [T0044 Seed distortions](techniques/T0044.md) |
| [T0045 Use fake experts](techniques/T0045.md) |
| [T0046 Use Search Engine Optimization](techniques/T0046.md) |
| [T0113 Employ Commercial Analytic Firms](techniques/T0113.md) |

View File

@ -16,10 +16,10 @@
| Techniques |
| ---------- |
| [T0114 Deliver Ads](../generated_pages/techniques/T0114.md) |
| [T0115 Post Content](../generated_pages/techniques/T0115.md) |
| [T0116 Comment or Reply on Content](../generated_pages/techniques/T0116.md) |
| [T0117 Attract Traditional Media](../generated_pages/techniques/T0117.md) |
| [T0114 Deliver Ads](techniques/T0114.md) |
| [T0115 Post Content](techniques/T0115.md) |
| [T0116 Comment or Reply on Content](techniques/T0116.md) |
| [T0117 Attract Traditional Media](techniques/T0117.md) |

View File

@ -14,11 +14,11 @@
| Techniques |
| ---------- |
| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) |
| [T0057 Organize Events](../generated_pages/techniques/T0057.md) |
| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) |
| [T0126 Encourage Attendance at Events](../generated_pages/techniques/T0126.md) |
| [T0127 Physical Violence](../generated_pages/techniques/T0127.md) |
| [T0017 Conduct fundraising](techniques/T0017.md) |
| [T0057 Organize Events](techniques/T0057.md) |
| [T0061 Sell Merchandise](techniques/T0061.md) |
| [T0126 Encourage Attendance at Events](techniques/T0126.md) |
| [T0127 Physical Violence](techniques/T0127.md) |

View File

@ -19,12 +19,12 @@
| Techniques |
| ---------- |
| [T0059 Play the long game](../generated_pages/techniques/T0059.md) |
| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) |
| [T0128 Conceal People](../generated_pages/techniques/T0128.md) |
| [T0129 Conceal Operational Activity](../generated_pages/techniques/T0129.md) |
| [T0130 Conceal Infrastructure](../generated_pages/techniques/T0130.md) |
| [T0131 Exploit TOS/Content Moderation](../generated_pages/techniques/T0131.md) |
| [T0059 Play the long game](techniques/T0059.md) |
| [T0060 Continue to Amplify](techniques/T0060.md) |
| [T0128 Conceal People](techniques/T0128.md) |
| [T0129 Conceal Operational Activity](techniques/T0129.md) |
| [T0130 Conceal Infrastructure](techniques/T0130.md) |
| [T0131 Exploit TOS/Content Moderation](techniques/T0131.md) |

View File

@ -17,9 +17,9 @@
| Techniques |
| ---------- |
| [T0132 Measure Performance](../generated_pages/techniques/T0132.md) |
| [T0133 Measure Effectiveness](../generated_pages/techniques/T0133.md) |
| [T0134 Measure Effectiveness Indicators (or KPIs)](../generated_pages/techniques/T0134.md) |
| [T0132 Measure Performance](techniques/T0132.md) |
| [T0133 Measure Effectiveness](techniques/T0133.md) |
| [T0134 Measure Effectiveness Indicators (or KPIs)](techniques/T0134.md) |

View File

@ -13,9 +13,9 @@
| Techniques |
| ---------- |
| [T0072 Segment Audiences](../generated_pages/techniques/T0072.md) |
| [T0080 Map Target Audience Information Environment](../generated_pages/techniques/T0080.md) |
| [T0081 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0081.md) |
| [T0072 Segment Audiences](techniques/T0072.md) |
| [T0080 Map Target Audience Information Environment](techniques/T0080.md) |
| [T0081 Identify Social and Technical Vulnerabilities](techniques/T0081.md) |

View File

@ -13,13 +13,13 @@
| Techniques |
| ---------- |
| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) |
| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) |
| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) |
| [T0040 Demand insurmountable proof](../generated_pages/techniques/T0040.md) |
| [T0068 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0068.md) |
| [T0082 Develop New Narratives](../generated_pages/techniques/T0082.md) |
| [T0083 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0083.md) |
| [T0003 Leverage Existing Narratives](techniques/T0003.md) |
| [T0004 Develop Competing Narratives](techniques/T0004.md) |
| [T0022 Leverage Conspiracy Theory Narratives](techniques/T0022.md) |
| [T0040 Demand insurmountable proof](techniques/T0040.md) |
| [T0068 Respond to Breaking News Event or Active Crisis](techniques/T0068.md) |
| [T0082 Develop New Narratives](techniques/T0082.md) |
| [T0083 Integrate Target Audience Vulnerabilities into Narrative](techniques/T0083.md) |

View File

@ -23,18 +23,18 @@ Establishing information assets allows an influence operation to promote messagi
| Techniques |
| ---------- |
| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) |
| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) |
| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) |
| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) |
| [T0065 Prepare Physical Broadcast Capabilities](../generated_pages/techniques/T0065.md) |
| [T0090 Create Inauthentic Accounts](../generated_pages/techniques/T0090.md) |
| [T0091 Recruit bad actors](../generated_pages/techniques/T0091.md) |
| [T0092 Build Network](../generated_pages/techniques/T0092.md) |
| [T0093 Acquire/ recruit Network](../generated_pages/techniques/T0093.md) |
| [T0094 Infiltrate Existing Networks](../generated_pages/techniques/T0094.md) |
| [T0095 Develop Owned Media Assets](../generated_pages/techniques/T0095.md) |
| [T0096 Leverage Content Farm](../generated_pages/techniques/T0096.md) |
| [T0007 Create Inauthentic Social Media Pages and Groups](techniques/T0007.md) |
| [T0010 Cultivate ignorant agents](techniques/T0010.md) |
| [T0013 Create inauthentic websites](techniques/T0013.md) |
| [T0014 Prepare fundraising campaigns](techniques/T0014.md) |
| [T0065 Prepare Physical Broadcast Capabilities](techniques/T0065.md) |
| [T0090 Create Inauthentic Accounts](techniques/T0090.md) |
| [T0091 Recruit bad actors](techniques/T0091.md) |
| [T0092 Build Network](techniques/T0092.md) |
| [T0093 Acquire/ recruit Network](techniques/T0093.md) |
| [T0094 Infiltrate Existing Networks](techniques/T0094.md) |
| [T0095 Develop Owned Media Assets](techniques/T0095.md) |
| [T0096 Leverage Content Farm](techniques/T0096.md) |

View File

@ -1,6 +1,6 @@
# Tactic TA16: Establish Legitimacy
* **Summary:** TBD
* **Summary:** Establish assets that create trust
* **Belongs to phase:** P02
@ -13,12 +13,12 @@
| Techniques |
| ---------- |
| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) |
| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) |
| [T0097 Create personas](../generated_pages/techniques/T0097.md) |
| [T0098 Establish Inauthentic News Sites](../generated_pages/techniques/T0098.md) |
| [T0099 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0099.md) |
| [T0100 Co-opt Trusted Sources](../generated_pages/techniques/T0100.md) |
| [T0009 Create fake experts](techniques/T0009.md) |
| [T0011 Compromise legitimate accounts](techniques/T0011.md) |
| [T0097 Create personas](techniques/T0097.md) |
| [T0098 Establish Inauthentic News Sites](techniques/T0098.md) |
| [T0099 Prepare Assets Impersonating Legitimate Entities](techniques/T0099.md) |
| [T0100 Co-opt Trusted Sources](techniques/T0100.md) |

View File

@ -13,12 +13,12 @@
| Techniques |
| ---------- |
| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) |
| [T0118 Amplify Existing Narrative](../generated_pages/techniques/T0118.md) |
| [T0119 Cross-Posting](../generated_pages/techniques/T0119.md) |
| [T0120 Incentivize Sharing](../generated_pages/techniques/T0120.md) |
| [T0121 Manipulate Platform Algorithm](../generated_pages/techniques/T0121.md) |
| [T0122 Direct Users to Alternative Platforms](../generated_pages/techniques/T0122.md) |
| [T0049 Flooding the Information Space](techniques/T0049.md) |
| [T0118 Amplify Existing Narrative](techniques/T0118.md) |
| [T0119 Cross-Posting](techniques/T0119.md) |
| [T0120 Incentivize Sharing](techniques/T0120.md) |
| [T0121 Manipulate Platform Algorithm](techniques/T0121.md) |
| [T0122 Direct Users to Alternative Platforms](techniques/T0122.md) |

View File

@ -13,11 +13,11 @@
| Techniques |
| ---------- |
| [T0047 Censor social media as a political force](../generated_pages/techniques/T0047.md) |
| [T0048 Harass](../generated_pages/techniques/T0048.md) |
| [T0123 Control Information Environment through Offensive Cyberspace Operations](../generated_pages/techniques/T0123.md) |
| [T0124 Suppress Opposition](../generated_pages/techniques/T0124.md) |
| [T0125 Platform Filtering](../generated_pages/techniques/T0125.md) |
| [T0047 Censor social media as a political force](techniques/T0047.md) |
| [T0048 Harass](techniques/T0048.md) |
| [T0123 Control Information Environment through Offensive Cyberspace Operations](techniques/T0123.md) |
| [T0124 Suppress Opposition](techniques/T0124.md) |
| [T0125 Platform Filtering](techniques/T0125.md) |

View File

@ -32,7 +32,7 @@
<tr>
<td><a href="tactics/TA06.md">TA06</a></td>
<td>Develop Content</td>
<td>TBD</td>
<td>Create or acquire text, images, and other content</td>
<td>P02</td>
</tr>
<tr>
@ -93,7 +93,7 @@ Establishing information assets allows an influence operation to promote messagi
<tr>
<td><a href="tactics/TA16.md">TA16</a></td>
<td>Establish Legitimacy</td>
<td>TBD</td>
<td>Establish assets that create trust</td>
<td>P02</td>
</tr>
<tr>

View File

@ -8,222 +8,6 @@
<th>tactic_id</th>
</tr>
<tr>
<td><a href="techniques/T0002.md">T0002</a></td>
<td>Facilitate State Propaganda</td>
<td>Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0003.md">T0003</a></td>
<td>Leverage Existing Narratives</td>
<td>Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. </td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0004.md">T0004</a></td>
<td>Develop Competing Narratives</td>
<td>Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach.</td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0007.md">T0007</a></td>
<td>Create Inauthentic Social Media Pages and Groups</td>
<td>Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0009.md">T0009</a></td>
<td>Create fake experts</td>
<td>Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. </td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0010.md">T0010</a></td>
<td>Cultivate ignorant agents</td>
<td>Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the states own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents".</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0011.md">T0011</a></td>
<td>Compromise legitimate accounts</td>
<td>Hack or take over legimate accounts to distribute misinformation or damaging content.</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0013.md">T0013</a></td>
<td>Create inauthentic websites</td>
<td>Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0014.md">T0014</a></td>
<td>Prepare fundraising campaigns</td>
<td>Fundraising campaigns refer to an influence operations systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. </td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0015.md">T0015</a></td>
<td>Create hashtags and search artifacts</td>
<td>Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). </td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0016.md">T0016</a></td>
<td>Create Clickbait</td>
<td>Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset.</td>
<td>TA05</td>
</tr>
<tr>
<td><a href="techniques/T0017.md">T0017</a></td>
<td>Conduct fundraising</td>
<td>Fundraising campaigns refer to an influence operations systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. </td>
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0018.md">T0018</a></td>
<td>Purchase Targeted Advertisements</td>
<td>Create or fund advertisements targeted at specific populations</td>
<td>TA05</td>
</tr>
<tr>
<td><a href="techniques/T0019.md">T0019</a></td>
<td>Generate information pollution</td>
<td>Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0020.md">T0020</a></td>
<td>Trial content</td>
<td>Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0022.md">T0022</a></td>
<td>Leverage Conspiracy Theory Narratives</td>
<td>"Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. </td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0023.md">T0023</a></td>
<td>Distort facts</td>
<td>Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0029.md">T0029</a></td>
<td>Online polls</td>
<td>Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0039 .md">T0039 </a></td>
<td>Bait legitimate influencers</td>
<td>Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0040.md">T0040</a></td>
<td>Demand insurmountable proof</td>
<td>Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof.</td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0042.md">T0042</a></td>
<td>Seed Kernel of truth</td>
<td>Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters.</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0043.md">T0043</a></td>
<td>Chat apps</td>
<td>Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0044.md">T0044</a></td>
<td>Seed distortions</td>
<td>Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. </td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0045.md">T0045</a></td>
<td>Use fake experts</td>
<td>Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0046.md">T0046</a></td>
<td>Use Search Engine Optimization</td>
<td>Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" </td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0047.md">T0047</a></td>
<td>Censor social media as a political force</td>
<td>Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports).</td>
<td>TA18</td>
</tr>
<tr>
<td><a href="techniques/T0048.md">T0048</a></td>
<td>Harass</td>
<td>Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. </td>
<td>TA18</td>
</tr>
<tr>
<td><a href="techniques/T0049.md">T0049</a></td>
<td>Flooding the Information Space</td>
<td>Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.</td>
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0057.md">T0057</a></td>
<td>Organize Events</td>
<td>Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.</td>
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0059.md">T0059</a></td>
<td>Play the long game</td>
<td>Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative.</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0060.md">T0060</a></td>
<td>Continue to Amplify</td>
<td>continue narrative or message amplification after the main incident work has finished</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0061.md">T0061</a></td>
<td>Sell Merchandise</td>
<td>Sell mechandise refers to getting the message or narrative into physical space in the offline world while making money</td>
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0065.md">T0065</a></td>
<td>Prepare Physical Broadcast Capabilities</td>
<td>Create or coopt broadcast capabilities (e.g. TV, radio etc).</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0066.md">T0066</a></td>
<td>Degrade Adversary</td>
<td>Plan to degrade an adversarys image or ability to act. This could include preparation and use of harmful information about the adversarys actions or reputation.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0068.md">T0068</a></td>
<td>Respond to Breaking News Event or Active Crisis</td>
<td>Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. </td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0072.md">T0072</a></td>
<td>Segment Audiences</td>
<td>Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. </td>
<td>TA13</td>
</tr>
<tr>
<td><a href="techniques/T0073.md">T0073</a></td>
<td>Determine Target Audiences</td>
<td>tbd</td>
@ -236,36 +20,6 @@
<td>TA01</td>
</tr>
<tr>
<td><a href="techniques/T0075.md">T0075</a></td>
<td>Dismiss</td>
<td>Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0076.md">T0076</a></td>
<td>Distort</td>
<td>Twist the narrative. Take information, or artifacts like images, and change the framing around them.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0077.md">T0077</a></td>
<td>Distract</td>
<td>Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that theyve accused you of (e.g. police brutality).</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0078.md">T0078</a></td>
<td>Dismay</td>
<td>Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0079.md">T0079</a></td>
<td>Divide</td>
<td>Create conflict between subgroups, to widen divisions in a community</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0080.md">T0080</a></td>
<td>Map Target Audience Information Environment</td>
<td>Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience.
@ -560,24 +314,6 @@ An influence operation may use a wide variety of cyber techniques to impersonate
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0128.md">T0128</a></td>
<td>Conceal People</td>
<td>Conceal the identity or provenance of the account and people assets.</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0129.md">T0129</a></td>
<td>Conceal Operational Activity</td>
<td>tbd</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0130.md">T0130</a></td>
<td>Conceal Infrastructure</td>
<td>tbd</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0131.md">T0131</a></td>
<td>Exploit TOS/Content Moderation</td>
<td>tbd</td>
@ -601,4 +337,268 @@ An influence operation may use a wide variety of cyber techniques to impersonate
<td>tbd</td>
<td>TA12</td>
</tr>
<tr>
<td><a href="techniques/T0002.md">T0002</a></td>
<td>Facilitate State Propaganda</td>
<td>Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0003.md">T0003</a></td>
<td>Leverage Existing Narratives</td>
<td>Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. </td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0004.md">T0004</a></td>
<td>Develop Competing Narratives</td>
<td>Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach.</td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0007.md">T0007</a></td>
<td>Create Inauthentic Social Media Pages and Groups</td>
<td>Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0009.md">T0009</a></td>
<td>Create fake experts</td>
<td>Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. </td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0010.md">T0010</a></td>
<td>Cultivate ignorant agents</td>
<td>Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the states own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents".</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0011.md">T0011</a></td>
<td>Compromise legitimate accounts</td>
<td>Hack or take over legimate accounts to distribute misinformation or damaging content.</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0013.md">T0013</a></td>
<td>Create inauthentic websites</td>
<td>Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0014.md">T0014</a></td>
<td>Prepare fundraising campaigns</td>
<td>Fundraising campaigns refer to an influence operations systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. </td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0015.md">T0015</a></td>
<td>Create hashtags and search artifacts</td>
<td>Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). </td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0016.md">T0016</a></td>
<td>Create Clickbait</td>
<td>Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset.</td>
<td>TA05</td>
</tr>
<tr>
<td><a href="techniques/T0017.md">T0017</a></td>
<td>Conduct fundraising</td>
<td>Fundraising campaigns refer to an influence operations systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. </td>
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0018.md">T0018</a></td>
<td>Purchase Targeted Advertisements</td>
<td>Create or fund advertisements targeted at specific populations</td>
<td>TA05</td>
</tr>
<tr>
<td><a href="techniques/T0019.md">T0019</a></td>
<td>Generate information pollution</td>
<td>Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0020.md">T0020</a></td>
<td>Trial content</td>
<td>Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0022.md">T0022</a></td>
<td>Leverage Conspiracy Theory Narratives</td>
<td>"Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. </td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0023.md">T0023</a></td>
<td>Distort facts</td>
<td>Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0029.md">T0029</a></td>
<td>Online polls</td>
<td>Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0039 .md">T0039 </a></td>
<td>Bait legitimate influencers</td>
<td>Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0040.md">T0040</a></td>
<td>Demand insurmountable proof</td>
<td>Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof.</td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0042.md">T0042</a></td>
<td>Seed Kernel of truth</td>
<td>Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters.</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0043.md">T0043</a></td>
<td>Chat apps</td>
<td>Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0044.md">T0044</a></td>
<td>Seed distortions</td>
<td>Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. </td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0045.md">T0045</a></td>
<td>Use fake experts</td>
<td>Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias</td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0046.md">T0046</a></td>
<td>Use Search Engine Optimization</td>
<td>Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" </td>
<td>TA08</td>
</tr>
<tr>
<td><a href="techniques/T0047.md">T0047</a></td>
<td>Censor social media as a political force</td>
<td>Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports).</td>
<td>TA18</td>
</tr>
<tr>
<td><a href="techniques/T0048.md">T0048</a></td>
<td>Harass</td>
<td>Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. </td>
<td>TA18</td>
</tr>
<tr>
<td><a href="techniques/T0049.md">T0049</a></td>
<td>Flooding the Information Space</td>
<td>Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.</td>
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0057.md">T0057</a></td>
<td>Organize Events</td>
<td>Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.</td>
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0059.md">T0059</a></td>
<td>Play the long game</td>
<td>Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative.</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0060.md">T0060</a></td>
<td>Continue to Amplify</td>
<td>continue narrative or message amplification after the main incident work has finished</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0061.md">T0061</a></td>
<td>Sell Merchandise</td>
<td>Sell mechandise refers to getting the message or narrative into physical space in the offline world while making money</td>
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0065.md">T0065</a></td>
<td>Prepare Physical Broadcast Capabilities</td>
<td>Create or coopt broadcast capabilities (e.g. TV, radio etc).</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0066.md">T0066</a></td>
<td>Degrade Adversary</td>
<td>Plan to degrade an adversarys image or ability to act. This could include preparation and use of harmful information about the adversarys actions or reputation.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0068.md">T0068</a></td>
<td>Respond to Breaking News Event or Active Crisis</td>
<td>Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. </td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0072.md">T0072</a></td>
<td>Segment Audiences</td>
<td>Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. </td>
<td>TA13</td>
</tr>
<tr>
<td><a href="techniques/T0075.md">T0075</a></td>
<td>Dismiss</td>
<td>Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0076.md">T0076</a></td>
<td>Distort</td>
<td>Twist the narrative. Take information, or artifacts like images, and change the framing around them.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0077.md">T0077</a></td>
<td>Distract</td>
<td>Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that theyve accused you of (e.g. police brutality).</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0078.md">T0078</a></td>
<td>Dismay</td>
<td>Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0079.md">T0079</a></td>
<td>Divide</td>
<td>Create conflict between subgroups, to widen divisions in a community</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0128.md">T0128</a></td>
<td>Conceal People</td>
<td>Conceal the identity or provenance of the account and people assets.</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0129.md">T0129</a></td>
<td>Conceal Operational Activity</td>
<td>tbd</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0130.md">T0130</a></td>
<td>Conceal Infrastructure</td>
<td>tbd</td>
<td>TA11</td>
</tr>
</table>