New Version 1.3 of Red Framework: EEAS Requests Plus Major Enhancements to TA01 and TA02

This commit is contained in:
Stephen Campbell 2023-09-13 18:16:14 -04:00
parent 7a65c376bb
commit 62680c33d5
51 changed files with 1406 additions and 111 deletions

View File

@ -96,7 +96,7 @@ function handleTechniqueClick(box) {
<td id="T0048">T0048 Harass<input type="checkbox" id="T0048check" onclick="handleTechniqueClick('T0048')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0074.001">T0074.001 Geopolitical Advantage<input type="checkbox" id="T0074.001check" onclick="handleTechniqueClick('T0074.001')"></td>
<td id="T0075">T0075 Dismiss<input type="checkbox" id="T0075check" onclick="handleTechniqueClick('T0075')"></td>
<td id="T0101">T0101 Create Localised Content<input type="checkbox" id="T0101check" onclick="handleTechniqueClick('T0101')"></td>
<td id="T0019.001">T0019.001 Create Fake Research<input type="checkbox" id="T0019.001check" onclick="handleTechniqueClick('T0019.001')"></td>
@ -104,7 +104,7 @@ function handleTechniqueClick(box) {
<td id="T0042">T0042 Seed Kernel of Truth<input type="checkbox" id="T0042check" onclick="handleTechniqueClick('T0042')"></td>
<td id="T0114.002">T0114.002 Traditional Media<input type="checkbox" id="T0114.002check" onclick="handleTechniqueClick('T0114.002')"></td>
<td id="T0057">T0057 Organise Events<input type="checkbox" id="T0057check" onclick="handleTechniqueClick('T0057')"></td>
<td id="T0128">T0128 Conceal People<input type="checkbox" id="T0128check" onclick="handleTechniqueClick('T0128')"></td>
<td id="T0128">T0128 Conceal Information Assets<input type="checkbox" id="T0128check" onclick="handleTechniqueClick('T0128')"></td>
<td id="T0132.002">T0132.002 Content Focused<input type="checkbox" id="T0132.002check" onclick="handleTechniqueClick('T0132.002')"></td>
<td id="T0072.002">T0072.002 Demographic Segmentation<input type="checkbox" id="T0072.002check" onclick="handleTechniqueClick('T0072.002')"></td>
<td id="T0022">T0022 Leverage Conspiracy Theory Narratives<input type="checkbox" id="T0022check" onclick="handleTechniqueClick('T0022')"></td>
@ -114,7 +114,7 @@ function handleTechniqueClick(box) {
<td id="T0048.001">T0048.001 Boycott/"Cancel" Opponents<input type="checkbox" id="T0048.001check" onclick="handleTechniqueClick('T0048.001')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0074.002">T0074.002 Domestic Political Advantage<input type="checkbox" id="T0074.002check" onclick="handleTechniqueClick('T0074.002')"></td>
<td id="T0075.001">T0075.001 Discredit Credible Sources<input type="checkbox" id="T0075.001check" onclick="handleTechniqueClick('T0075.001')"></td>
<td id="T0102">T0102 Leverage Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102check" onclick="handleTechniqueClick('T0102')"></td>
<td id="T0019.002">T0019.002 Hijack Hashtags<input type="checkbox" id="T0019.002check" onclick="handleTechniqueClick('T0019.002')"></td>
@ -132,7 +132,7 @@ function handleTechniqueClick(box) {
<td id="T0048.002">T0048.002 Harass People Based on Identities<input type="checkbox" id="T0048.002check" onclick="handleTechniqueClick('T0048.002')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0074.003">T0074.003 Economic Advantage<input type="checkbox" id="T0074.003check" onclick="handleTechniqueClick('T0074.003')"></td>
<td id="T0076">T0076 Distort<input type="checkbox" id="T0076check" onclick="handleTechniqueClick('T0076')"></td>
<td id="T0102.001">T0102.001 Use Existing Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102.001check" onclick="handleTechniqueClick('T0102.001')"></td>
<td id="T0023">T0023 Distort Facts<input type="checkbox" id="T0023check" onclick="handleTechniqueClick('T0023')"></td>
@ -150,7 +150,7 @@ function handleTechniqueClick(box) {
<td id="T0048.003">T0048.003 Threaten to Dox<input type="checkbox" id="T0048.003check" onclick="handleTechniqueClick('T0048.003')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0074.004">T0074.004 Ideological Advantage<input type="checkbox" id="T0074.004check" onclick="handleTechniqueClick('T0074.004')"></td>
<td id="T0077">T0077 Distract<input type="checkbox" id="T0077check" onclick="handleTechniqueClick('T0077')"></td>
<td id="T0102.002">T0102.002 Create Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102.002check" onclick="handleTechniqueClick('T0102.002')"></td>
<td id="T0023.001">T0023.001 Reframe Context<input type="checkbox" id="T0023.001check" onclick="handleTechniqueClick('T0023.001')"></td>
@ -176,7 +176,7 @@ function handleTechniqueClick(box) {
<td id="T0113">T0113 Employ Commercial Analytic Firms<input type="checkbox" id="T0113check" onclick="handleTechniqueClick('T0113')"></td>
<td id="T0115.003">T0115.003 One-Way Direct Posting<input type="checkbox" id="T0115.003check" onclick="handleTechniqueClick('T0115.003')"></td>
<td id="T0126">T0126 Encourage Attendance at Events<input type="checkbox" id="T0126check" onclick="handleTechniqueClick('T0126')"></td>
<td id="T0128.004">T0128.004 Launder Accounts<input type="checkbox" id="T0128.004check" onclick="handleTechniqueClick('T0128.004')"></td>
<td id="T0128.004">T0128.004 Launder Information Assets<input type="checkbox" id="T0128.004check" onclick="handleTechniqueClick('T0128.004')"></td>
<td id="T0133.002">T0133.002 Content<input type="checkbox" id="T0133.002check" onclick="handleTechniqueClick('T0133.002')"></td>
<td id="T0080">T0080 Map Target Audience Information Environment<input type="checkbox" id="T0080check" onclick="handleTechniqueClick('T0080')"></td>
<td id="T0068">T0068 Respond to Breaking News Event or Active Crisis<input type="checkbox" id="T0068check" onclick="handleTechniqueClick('T0068')"></td>
@ -194,7 +194,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td id="T0116">T0116 Comment or Reply on Content<input type="checkbox" id="T0116check" onclick="handleTechniqueClick('T0116')"></td>
<td id="T0126.001">T0126.001 Call to Action to Attend<input type="checkbox" id="T0126.001check" onclick="handleTechniqueClick('T0126.001')"></td>
<td id="T0128.005">T0128.005 Change Names of Accounts<input type="checkbox" id="T0128.005check" onclick="handleTechniqueClick('T0128.005')"></td>
<td id="T0128.005">T0128.005 Change Names of Information Assets<input type="checkbox" id="T0128.005check" onclick="handleTechniqueClick('T0128.005')"></td>
<td id="T0133.003">T0133.003 Awareness<input type="checkbox" id="T0133.003check" onclick="handleTechniqueClick('T0133.003')"></td>
<td id="T0080.001">T0080.001 Monitor Social Media Analytics<input type="checkbox" id="T0080.001check" onclick="handleTechniqueClick('T0080.001')"></td>
<td id="T0082">T0082 Develop New Narratives<input type="checkbox" id="T0082check" onclick="handleTechniqueClick('T0082')"></td>
@ -205,7 +205,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0135">T0135 Undermine<input type="checkbox" id="T0135check" onclick="handleTechniqueClick('T0135')"></td>
<td bgcolor=white> </td>
<td id="T0084.001">T0084.001 Use Copypasta<input type="checkbox" id="T0084.001check" onclick="handleTechniqueClick('T0084.001')"></td>
<td id="T0104.001">T0104.001 Mainstream Social Networks<input type="checkbox" id="T0104.001check" onclick="handleTechniqueClick('T0104.001')"></td>
@ -223,7 +223,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0135.001">T0135.001 Smear<input type="checkbox" id="T0135.001check" onclick="handleTechniqueClick('T0135.001')"></td>
<td bgcolor=white> </td>
<td id="T0084.002">T0084.002 Plagiarise Content<input type="checkbox" id="T0084.002check" onclick="handleTechniqueClick('T0084.002')"></td>
<td id="T0104.002">T0104.002 Dating Apps<input type="checkbox" id="T0104.002check" onclick="handleTechniqueClick('T0104.002')"></td>
@ -241,7 +241,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0135.002">T0135.002 Thwart<input type="checkbox" id="T0135.002check" onclick="handleTechniqueClick('T0135.002')"></td>
<td bgcolor=white> </td>
<td id="T0084.003">T0084.003 Deceptively Labelled or Translated<input type="checkbox" id="T0084.003check" onclick="handleTechniqueClick('T0084.003')"></td>
<td id="T0104.003">T0104.003 Private/Closed Social Networks<input type="checkbox" id="T0104.003check" onclick="handleTechniqueClick('T0104.003')"></td>
@ -259,7 +259,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0135.003">T0135.003 Subvert<input type="checkbox" id="T0135.003check" onclick="handleTechniqueClick('T0135.003')"></td>
<td bgcolor=white> </td>
<td id="T0084.004">T0084.004 Appropriate Content<input type="checkbox" id="T0084.004check" onclick="handleTechniqueClick('T0084.004')"></td>
<td id="T0104.004">T0104.004 Interest-Based Networks<input type="checkbox" id="T0104.004check" onclick="handleTechniqueClick('T0104.004')"></td>
@ -277,7 +277,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0135.004">T0135.004 Polarise<input type="checkbox" id="T0135.004check" onclick="handleTechniqueClick('T0135.004')"></td>
<td bgcolor=white> </td>
<td id="T0085">T0085 Develop Text-Based Content<input type="checkbox" id="T0085check" onclick="handleTechniqueClick('T0085')"></td>
<td id="T0104.005">T0104.005 Use Hashtags<input type="checkbox" id="T0104.005check" onclick="handleTechniqueClick('T0104.005')"></td>
@ -295,7 +295,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136">T0136 Cultivate Support<input type="checkbox" id="T0136check" onclick="handleTechniqueClick('T0136')"></td>
<td bgcolor=white> </td>
<td id="T0085.001">T0085.001 Develop AI-Generated Text<input type="checkbox" id="T0085.001check" onclick="handleTechniqueClick('T0085.001')"></td>
<td id="T0104.006">T0104.006 Create Dedicated Hashtag<input type="checkbox" id="T0104.006check" onclick="handleTechniqueClick('T0104.006')"></td>
@ -313,7 +313,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.001">T0136.001 Defend Reputaton<input type="checkbox" id="T0136.001check" onclick="handleTechniqueClick('T0136.001')"></td>
<td bgcolor=white> </td>
<td id="T0085.002">T0085.002 Develop False or Altered Documents<input type="checkbox" id="T0085.002check" onclick="handleTechniqueClick('T0085.002')"></td>
<td id="T0105">T0105 Media Sharing Networks<input type="checkbox" id="T0105check" onclick="handleTechniqueClick('T0105')"></td>
@ -331,7 +331,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.002">T0136.002 Justify Action<input type="checkbox" id="T0136.002check" onclick="handleTechniqueClick('T0136.002')"></td>
<td bgcolor=white> </td>
<td id="T0085.003">T0085.003 Develop Inauthentic News Articles<input type="checkbox" id="T0085.003check" onclick="handleTechniqueClick('T0085.003')"></td>
<td id="T0105.001">T0105.001 Photo Sharing<input type="checkbox" id="T0105.001check" onclick="handleTechniqueClick('T0105.001')"></td>
@ -349,7 +349,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.003">T0136.003 Energise Supporters<input type="checkbox" id="T0136.003check" onclick="handleTechniqueClick('T0136.003')"></td>
<td bgcolor=white> </td>
<td id="T0086">T0086 Develop Image-Based Content<input type="checkbox" id="T0086check" onclick="handleTechniqueClick('T0086')"></td>
<td id="T0105.002">T0105.002 Video Sharing<input type="checkbox" id="T0105.002check" onclick="handleTechniqueClick('T0105.002')"></td>
@ -367,7 +367,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.004">T0136.004 Boost Reputation<input type="checkbox" id="T0136.004check" onclick="handleTechniqueClick('T0136.004')"></td>
<td bgcolor=white> </td>
<td id="T0086.001">T0086.001 Develop Memes<input type="checkbox" id="T0086.001check" onclick="handleTechniqueClick('T0086.001')"></td>
<td id="T0105.003">T0105.003 Audio Sharing<input type="checkbox" id="T0105.003check" onclick="handleTechniqueClick('T0105.003')"></td>
@ -385,7 +385,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.005">T0136.005 Cultvate Support for Initiative<input type="checkbox" id="T0136.005check" onclick="handleTechniqueClick('T0136.005')"></td>
<td bgcolor=white> </td>
<td id="T0086.002">T0086.002 Develop AI-Generated Images (Deepfakes)<input type="checkbox" id="T0086.002check" onclick="handleTechniqueClick('T0086.002')"></td>
<td id="T0106">T0106 Discussion Forums<input type="checkbox" id="T0106check" onclick="handleTechniqueClick('T0106')"></td>
@ -403,7 +403,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.006">T0136.006 Cultivate Support for Ally<input type="checkbox" id="T0136.006check" onclick="handleTechniqueClick('T0136.006')"></td>
<td bgcolor=white> </td>
<td id="T0086.003">T0086.003 Deceptively Edit Images (Cheap Fakes)<input type="checkbox" id="T0086.003check" onclick="handleTechniqueClick('T0086.003')"></td>
<td id="T0106.001">T0106.001 Anonymous Message Boards<input type="checkbox" id="T0106.001check" onclick="handleTechniqueClick('T0106.001')"></td>
@ -421,7 +421,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.007">T0136.007 Recruit Members<input type="checkbox" id="T0136.007check" onclick="handleTechniqueClick('T0136.007')"></td>
<td bgcolor=white> </td>
<td id="T0086.004">T0086.004 Aggregate Information into Evidence Collages<input type="checkbox" id="T0086.004check" onclick="handleTechniqueClick('T0086.004')"></td>
<td id="T0107">T0107 Bookmarking and Content Curation<input type="checkbox" id="T0107check" onclick="handleTechniqueClick('T0107')"></td>
@ -439,7 +439,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0136.008">T0136.008 Increase Prestige<input type="checkbox" id="T0136.008check" onclick="handleTechniqueClick('T0136.008')"></td>
<td bgcolor=white> </td>
<td id="T0087">T0087 Develop Video-Based Content<input type="checkbox" id="T0087check" onclick="handleTechniqueClick('T0087')"></td>
<td id="T0108">T0108 Blogging and Publishing Networks<input type="checkbox" id="T0108check" onclick="handleTechniqueClick('T0108')"></td>
@ -457,7 +457,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0137">T0137 Make Money<input type="checkbox" id="T0137check" onclick="handleTechniqueClick('T0137')"></td>
<td bgcolor=white> </td>
<td id="T0087.001">T0087.001 Develop AI-Generated Videos (Deepfakes)<input type="checkbox" id="T0087.001check" onclick="handleTechniqueClick('T0087.001')"></td>
<td id="T0109">T0109 Consumer Review Networks<input type="checkbox" id="T0109check" onclick="handleTechniqueClick('T0109')"></td>
@ -475,7 +475,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0137.001">T0137.001 Generate Ad Revenue<input type="checkbox" id="T0137.001check" onclick="handleTechniqueClick('T0137.001')"></td>
<td bgcolor=white> </td>
<td id="T0087.002">T0087.002 Deceptively Edit Video (Cheap Fakes)<input type="checkbox" id="T0087.002check" onclick="handleTechniqueClick('T0087.002')"></td>
<td id="T0110">T0110 Formal Diplomatic Channels<input type="checkbox" id="T0110check" onclick="handleTechniqueClick('T0110')"></td>
@ -493,7 +493,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0137.002">T0137.002 Scam<input type="checkbox" id="T0137.002check" onclick="handleTechniqueClick('T0137.002')"></td>
<td bgcolor=white> </td>
<td id="T0088">T0088 Develop Audio-Based Content<input type="checkbox" id="T0088check" onclick="handleTechniqueClick('T0088')"></td>
<td id="T0111">T0111 Traditional Media<input type="checkbox" id="T0111check" onclick="handleTechniqueClick('T0111')"></td>
@ -511,7 +511,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0137.003">T0137.003 Raise Funds<input type="checkbox" id="T0137.003check" onclick="handleTechniqueClick('T0137.003')"></td>
<td bgcolor=white> </td>
<td id="T0088.001">T0088.001 Develop AI-Generated Audio (Deepfakes)<input type="checkbox" id="T0088.001check" onclick="handleTechniqueClick('T0088.001')"></td>
<td id="T0111.001">T0111.001 TV<input type="checkbox" id="T0111.001check" onclick="handleTechniqueClick('T0111.001')"></td>
@ -529,7 +529,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0137.004">T0137.004 Sell Items under False Pretences<input type="checkbox" id="T0137.004check" onclick="handleTechniqueClick('T0137.004')"></td>
<td bgcolor=white> </td>
<td id="T0088.002">T0088.002 Deceptively Edit Audio (Cheap Fakes)<input type="checkbox" id="T0088.002check" onclick="handleTechniqueClick('T0088.002')"></td>
<td id="T0111.002">T0111.002 Newspaper<input type="checkbox" id="T0111.002check" onclick="handleTechniqueClick('T0111.002')"></td>
@ -547,7 +547,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0137.005">T0137.005 Extort<input type="checkbox" id="T0137.005check" onclick="handleTechniqueClick('T0137.005')"></td>
<td bgcolor=white> </td>
<td id="T0089">T0089 Obtain Private Documents<input type="checkbox" id="T0089check" onclick="handleTechniqueClick('T0089')"></td>
<td id="T0111.003">T0111.003 Radio<input type="checkbox" id="T0111.003check" onclick="handleTechniqueClick('T0111.003')"></td>
@ -565,7 +565,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0137.006">T0137.006 Manipulate Stocks<input type="checkbox" id="T0137.006check" onclick="handleTechniqueClick('T0137.006')"></td>
<td bgcolor=white> </td>
<td id="T0089.001">T0089.001 Obtain Authentic Documents<input type="checkbox" id="T0089.001check" onclick="handleTechniqueClick('T0089.001')"></td>
<td id="T0112">T0112 Email<input type="checkbox" id="T0112check" onclick="handleTechniqueClick('T0112')"></td>
@ -583,7 +583,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0138">T0138 Motivate to Act<input type="checkbox" id="T0138check" onclick="handleTechniqueClick('T0138')"></td>
<td bgcolor=white> </td>
<td id="T0089.002">T0089.002 Create Inauthentic Documents<input type="checkbox" id="T0089.002check" onclick="handleTechniqueClick('T0089.002')"></td>
<td bgcolor=white> </td>
@ -601,7 +601,7 @@ function handleTechniqueClick(box) {
</tr>
<tr>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0138.001">T0138.001 Encourage<input type="checkbox" id="T0138.001check" onclick="handleTechniqueClick('T0138.001')"></td>
<td bgcolor=white> </td>
<td id="T0089.003">T0089.003 Alter Authentic Documents<input type="checkbox" id="T0089.003check" onclick="handleTechniqueClick('T0089.003')"></td>
<td bgcolor=white> </td>
@ -618,6 +618,186 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0138.002">T0138.002 Provoke<input type="checkbox" id="T0138.002check" onclick="handleTechniqueClick('T0138.002')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0138.003">T0138.003 Compel<input type="checkbox" id="T0138.003check" onclick="handleTechniqueClick('T0138.003')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0139">T0139 Dissuade from Acting<input type="checkbox" id="T0139check" onclick="handleTechniqueClick('T0139')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0139.001">T0139.001 Discourage<input type="checkbox" id="T0139.001check" onclick="handleTechniqueClick('T0139.001')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0139.002">T0139.002 Silence<input type="checkbox" id="T0139.002check" onclick="handleTechniqueClick('T0139.002')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0139.003">T0139.003 Deter<input type="checkbox" id="T0139.003check" onclick="handleTechniqueClick('T0139.003')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0140">T0140 Cause Harm<input type="checkbox" id="T0140check" onclick="handleTechniqueClick('T0140')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0140.001">T0140.001 Defame<input type="checkbox" id="T0140.001check" onclick="handleTechniqueClick('T0140.001')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0140.002">T0140.002 Intimidate<input type="checkbox" id="T0140.002check" onclick="handleTechniqueClick('T0140.002')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0140.003">T0140.003 Spread Hate<input type="checkbox" id="T0140.003check" onclick="handleTechniqueClick('T0140.003')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
</tr>
<tr>
</tr>
</table>
<hr>
@ -654,6 +834,7 @@ function handleTechniqueClick(box) {
<li id="T0009.001text" style="display:none">T0009.001: Utilise Academic/Pseudoscientific Justifications</li>
<li id="T0049.001text" style="display:none">T0049.001: Trolls Amplify and Manipulate</li>
<li id="T0048text" style="display:none">T0048: Harass</li>
<li id="T0074.001text" style="display:none">T0074.001: Geopolitical Advantage</li>
<li id="T0075text" style="display:none">T0075: Dismiss</li>
<li id="T0101text" style="display:none">T0101: Create Localised Content</li>
<li id="T0019.001text" style="display:none">T0019.001: Create Fake Research</li>
@ -661,7 +842,7 @@ function handleTechniqueClick(box) {
<li id="T0042text" style="display:none">T0042: Seed Kernel of Truth</li>
<li id="T0114.002text" style="display:none">T0114.002: Traditional Media</li>
<li id="T0057text" style="display:none">T0057: Organise Events</li>
<li id="T0128text" style="display:none">T0128: Conceal People</li>
<li id="T0128text" style="display:none">T0128: Conceal Information Assets</li>
<li id="T0132.002text" style="display:none">T0132.002: Content Focused</li>
<li id="T0072.002text" style="display:none">T0072.002: Demographic Segmentation</li>
<li id="T0022text" style="display:none">T0022: Leverage Conspiracy Theory Narratives</li>
@ -669,6 +850,7 @@ function handleTechniqueClick(box) {
<li id="T0011text" style="display:none">T0011: Compromise Legitimate Accounts</li>
<li id="T0049.002text" style="display:none">T0049.002: Hijack Existing Hashtag</li>
<li id="T0048.001text" style="display:none">T0048.001: Boycott/"Cancel" Opponents</li>
<li id="T0074.002text" style="display:none">T0074.002: Domestic Political Advantage</li>
<li id="T0075.001text" style="display:none">T0075.001: Discredit Credible Sources</li>
<li id="T0102text" style="display:none">T0102: Leverage Echo Chambers/Filter Bubbles</li>
<li id="T0019.002text" style="display:none">T0019.002: Hijack Hashtags</li>
@ -684,6 +866,7 @@ function handleTechniqueClick(box) {
<li id="T0097text" style="display:none">T0097: Create Personas</li>
<li id="T0049.003text" style="display:none">T0049.003: Bots Amplify via Automated Forwarding and Reposting</li>
<li id="T0048.002text" style="display:none">T0048.002: Harass People Based on Identities</li>
<li id="T0074.003text" style="display:none">T0074.003: Economic Advantage</li>
<li id="T0076text" style="display:none">T0076: Distort</li>
<li id="T0102.001text" style="display:none">T0102.001: Use Existing Echo Chambers/Filter Bubbles</li>
<li id="T0023text" style="display:none">T0023: Distort Facts</li>
@ -699,6 +882,7 @@ function handleTechniqueClick(box) {
<li id="T0097.001text" style="display:none">T0097.001: Backstop Personas</li>
<li id="T0049.004text" style="display:none">T0049.004: Utilise Spamoflauge</li>
<li id="T0048.003text" style="display:none">T0048.003: Threaten to Dox</li>
<li id="T0074.004text" style="display:none">T0074.004: Ideological Advantage</li>
<li id="T0077text" style="display:none">T0077: Distract</li>
<li id="T0102.002text" style="display:none">T0102.002: Create Echo Chambers/Filter Bubbles</li>
<li id="T0023.001text" style="display:none">T0023.001: Reframe Context</li>
@ -721,7 +905,7 @@ function handleTechniqueClick(box) {
<li id="T0113text" style="display:none">T0113: Employ Commercial Analytic Firms</li>
<li id="T0115.003text" style="display:none">T0115.003: One-Way Direct Posting</li>
<li id="T0126text" style="display:none">T0126: Encourage Attendance at Events</li>
<li id="T0128.004text" style="display:none">T0128.004: Launder Accounts</li>
<li id="T0128.004text" style="display:none">T0128.004: Launder Information Assets</li>
<li id="T0133.002text" style="display:none">T0133.002: Content</li>
<li id="T0080text" style="display:none">T0080: Map Target Audience Information Environment</li>
<li id="T0068text" style="display:none">T0068: Respond to Breaking News Event or Active Crisis</li>
@ -734,7 +918,7 @@ function handleTechniqueClick(box) {
<li id="T0104text" style="display:none">T0104: Social Networks</li>
<li id="T0116text" style="display:none">T0116: Comment or Reply on Content</li>
<li id="T0126.001text" style="display:none">T0126.001: Call to Action to Attend</li>
<li id="T0128.005text" style="display:none">T0128.005: Change Names of Accounts</li>
<li id="T0128.005text" style="display:none">T0128.005: Change Names of Information Assets</li>
<li id="T0133.003text" style="display:none">T0133.003: Awareness</li>
<li id="T0080.001text" style="display:none">T0080.001: Monitor Social Media Analytics</li>
<li id="T0082text" style="display:none">T0082: Develop New Narratives</li>
@ -742,6 +926,7 @@ function handleTechniqueClick(box) {
<li id="T0098.002text" style="display:none">T0098.002: Leverage Existing Inauthentic News Sites</li>
<li id="T0049.007text" style="display:none">T0049.007: Inauthentic Sites Amplify News and Narratives</li>
<li id="T0123.001text" style="display:none">T0123.001: Delete Opposing Content</li>
<li id="T0135text" style="display:none">T0135: Undermine</li>
<li id="T0084.001text" style="display:none">T0084.001: Use Copypasta</li>
<li id="T0104.001text" style="display:none">T0104.001: Mainstream Social Networks</li>
<li id="T0116.001text" style="display:none">T0116.001: Post Inauthentic Social Media Comment</li>
@ -754,6 +939,7 @@ function handleTechniqueClick(box) {
<li id="T0099text" style="display:none">T0099: Prepare Assets Impersonating Legitimate Entities</li>
<li id="T0118text" style="display:none">T0118: Amplify Existing Narrative</li>
<li id="T0123.002text" style="display:none">T0123.002: Block Content</li>
<li id="T0135.001text" style="display:none">T0135.001: Smear</li>
<li id="T0084.002text" style="display:none">T0084.002: Plagiarise Content</li>
<li id="T0104.002text" style="display:none">T0104.002: Dating Apps</li>
<li id="T0117text" style="display:none">T0117: Attract Traditional Media</li>
@ -765,6 +951,7 @@ function handleTechniqueClick(box) {
<li id="T0099.001text" style="display:none">T0099.001: Astroturfing</li>
<li id="T0119text" style="display:none">T0119: Cross-Posting</li>
<li id="T0123.003text" style="display:none">T0123.003: Destroy Information Generation Capabilities</li>
<li id="T0135.002text" style="display:none">T0135.002: Thwart</li>
<li id="T0084.003text" style="display:none">T0084.003: Deceptively Labelled or Translated</li>
<li id="T0104.003text" style="display:none">T0104.003: Private/Closed Social Networks</li>
<li id="T0127.001text" style="display:none">T0127.001: Conduct Physical Violence</li>
@ -775,6 +962,7 @@ function handleTechniqueClick(box) {
<li id="T0099.002text" style="display:none">T0099.002: Spoof/Parody Account/Site</li>
<li id="T0119.001text" style="display:none">T0119.001: Post across Groups</li>
<li id="T0123.004text" style="display:none">T0123.004: Conduct Server Redirect</li>
<li id="T0135.003text" style="display:none">T0135.003: Subvert</li>
<li id="T0084.004text" style="display:none">T0084.004: Appropriate Content</li>
<li id="T0104.004text" style="display:none">T0104.004: Interest-Based Networks</li>
<li id="T0127.002text" style="display:none">T0127.002: Encourage Physical Violence</li>
@ -785,6 +973,7 @@ function handleTechniqueClick(box) {
<li id="T0100text" style="display:none">T0100: Co-Opt Trusted Sources</li>
<li id="T0119.002text" style="display:none">T0119.002: Post across Platform</li>
<li id="T0124text" style="display:none">T0124: Suppress Opposition</li>
<li id="T0135.004text" style="display:none">T0135.004: Polarise</li>
<li id="T0085text" style="display:none">T0085: Develop Text-Based Content</li>
<li id="T0104.005text" style="display:none">T0104.005: Use Hashtags</li>
<li id="T0129.004text" style="display:none">T0129.004: Delete URLs</li>
@ -794,6 +983,7 @@ function handleTechniqueClick(box) {
<li id="T0100.001text" style="display:none">T0100.001: Co-Opt Trusted Individuals</li>
<li id="T0119.003text" style="display:none">T0119.003: Post across Disciplines</li>
<li id="T0124.001text" style="display:none">T0124.001: Report Non-Violative Opposing Content</li>
<li id="T0136text" style="display:none">T0136: Cultivate Support</li>
<li id="T0085.001text" style="display:none">T0085.001: Develop AI-Generated Text</li>
<li id="T0104.006text" style="display:none">T0104.006: Create Dedicated Hashtag</li>
<li id="T0129.005text" style="display:none">T0129.005: Coordinate on Encrypted/Closed Networks</li>
@ -802,6 +992,7 @@ function handleTechniqueClick(box) {
<li id="T0100.002text" style="display:none">T0100.002: Co-Opt Grassroots Groups</li>
<li id="T0120text" style="display:none">T0120: Incentivize Sharing</li>
<li id="T0124.002text" style="display:none">T0124.002: Goad People into Harmful Action (Stop Hitting Yourself)</li>
<li id="T0136.001text" style="display:none">T0136.001: Defend Reputaton</li>
<li id="T0085.002text" style="display:none">T0085.002: Develop False or Altered Documents</li>
<li id="T0105text" style="display:none">T0105: Media Sharing Networks</li>
<li id="T0129.006text" style="display:none">T0129.006: Deny Involvement</li>
@ -810,6 +1001,7 @@ function handleTechniqueClick(box) {
<li id="T0100.003text" style="display:none">T0100.003: Co-Opt Influencers</li>
<li id="T0120.001text" style="display:none">T0120.001: Use Affiliate Marketing Programmes</li>
<li id="T0124.003text" style="display:none">T0124.003: Exploit Platform TOS/Content Moderation</li>
<li id="T0136.002text" style="display:none">T0136.002: Justify Action</li>
<li id="T0085.003text" style="display:none">T0085.003: Develop Inauthentic News Articles</li>
<li id="T0105.001text" style="display:none">T0105.001: Photo Sharing</li>
<li id="T0129.007text" style="display:none">T0129.007: Delete Accounts/Account Activity</li>
@ -817,68 +1009,93 @@ function handleTechniqueClick(box) {
<li id="T0091.003text" style="display:none">T0091.003: Enlist Troll Accounts</li>
<li id="T0120.002text" style="display:none">T0120.002: Use Contests and Prizes</li>
<li id="T0125text" style="display:none">T0125: Platform Filtering</li>
<li id="T0136.003text" style="display:none">T0136.003: Energise Supporters</li>
<li id="T0086text" style="display:none">T0086: Develop Image-Based Content</li>
<li id="T0105.002text" style="display:none">T0105.002: Video Sharing</li>
<li id="T0129.008text" style="display:none">T0129.008: Redirect URLs</li>
<li id="T0081.004text" style="display:none">T0081.004: Identify Existing Fissures</li>
<li id="T0092text" style="display:none">T0092: Build Network</li>
<li id="T0121text" style="display:none">T0121: Manipulate Platform Algorithm</li>
<li id="T0136.004text" style="display:none">T0136.004: Boost Reputation</li>
<li id="T0086.001text" style="display:none">T0086.001: Develop Memes</li>
<li id="T0105.003text" style="display:none">T0105.003: Audio Sharing</li>
<li id="T0129.009text" style="display:none">T0129.009: Remove Post Origins</li>
<li id="T0081.005text" style="display:none">T0081.005: Identify Existing Conspiracy Narratives/Suspicions</li>
<li id="T0092.001text" style="display:none">T0092.001: Create Organisations</li>
<li id="T0121.001text" style="display:none">T0121.001: Bypass Content Blocking</li>
<li id="T0136.005text" style="display:none">T0136.005: Cultvate Support for Initiative</li>
<li id="T0086.002text" style="display:none">T0086.002: Develop AI-Generated Images (Deepfakes)</li>
<li id="T0106text" style="display:none">T0106: Discussion Forums</li>
<li id="T0129.010text" style="display:none">T0129.010: Misattribute Activity</li>
<li id="T0081.006text" style="display:none">T0081.006: Identify Wedge Issues</li>
<li id="T0092.002text" style="display:none">T0092.002: Use Follow Trains</li>
<li id="T0122text" style="display:none">T0122: Direct Users to Alternative Platforms</li>
<li id="T0136.006text" style="display:none">T0136.006: Cultivate Support for Ally</li>
<li id="T0086.003text" style="display:none">T0086.003: Deceptively Edit Images (Cheap Fakes)</li>
<li id="T0106.001text" style="display:none">T0106.001: Anonymous Message Boards</li>
<li id="T0130text" style="display:none">T0130: Conceal Infrastructure</li>
<li id="T0081.007text" style="display:none">T0081.007: Identify Target Audience Adversaries</li>
<li id="T0092.003text" style="display:none">T0092.003: Create Community or Sub-Group</li>
<li id="T0136.007text" style="display:none">T0136.007: Recruit Members</li>
<li id="T0086.004text" style="display:none">T0086.004: Aggregate Information into Evidence Collages</li>
<li id="T0107text" style="display:none">T0107: Bookmarking and Content Curation</li>
<li id="T0130.001text" style="display:none">T0130.001: Conceal Sponsorship</li>
<li id="T0081.008text" style="display:none">T0081.008: Identify Media System Vulnerabilities</li>
<li id="T0093text" style="display:none">T0093: Acquire/Recruit Network</li>
<li id="T0136.008text" style="display:none">T0136.008: Increase Prestige</li>
<li id="T0087text" style="display:none">T0087: Develop Video-Based Content</li>
<li id="T0108text" style="display:none">T0108: Blogging and Publishing Networks</li>
<li id="T0130.002text" style="display:none">T0130.002: Utilise Bulletproof Hosting</li>
<li id="T0093.001text" style="display:none">T0093.001: Fund Proxies</li>
<li id="T0137text" style="display:none">T0137: Make Money</li>
<li id="T0087.001text" style="display:none">T0087.001: Develop AI-Generated Videos (Deepfakes)</li>
<li id="T0109text" style="display:none">T0109: Consumer Review Networks</li>
<li id="T0130.003text" style="display:none">T0130.003: Use Shell Organisations</li>
<li id="T0093.002text" style="display:none">T0093.002: Acquire Botnets</li>
<li id="T0137.001text" style="display:none">T0137.001: Generate Ad Revenue</li>
<li id="T0087.002text" style="display:none">T0087.002: Deceptively Edit Video (Cheap Fakes)</li>
<li id="T0110text" style="display:none">T0110: Formal Diplomatic Channels</li>
<li id="T0130.004text" style="display:none">T0130.004: Use Cryptocurrency</li>
<li id="T0094text" style="display:none">T0094: Infiltrate Existing Networks</li>
<li id="T0137.002text" style="display:none">T0137.002: Scam</li>
<li id="T0088text" style="display:none">T0088: Develop Audio-Based Content</li>
<li id="T0111text" style="display:none">T0111: Traditional Media</li>
<li id="T0130.005text" style="display:none">T0130.005: Obfuscate Payment</li>
<li id="T0094.001text" style="display:none">T0094.001: Identify Susceptible Targets in Networks</li>
<li id="T0137.003text" style="display:none">T0137.003: Raise Funds</li>
<li id="T0088.001text" style="display:none">T0088.001: Develop AI-Generated Audio (Deepfakes)</li>
<li id="T0111.001text" style="display:none">T0111.001: TV</li>
<li id="T0131text" style="display:none">T0131: Exploit TOS/Content Moderation</li>
<li id="T0094.002text" style="display:none">T0094.002: Utilise Butterfly Attacks</li>
<li id="T0137.004text" style="display:none">T0137.004: Sell Items under False Pretences</li>
<li id="T0088.002text" style="display:none">T0088.002: Deceptively Edit Audio (Cheap Fakes)</li>
<li id="T0111.002text" style="display:none">T0111.002: Newspaper</li>
<li id="T0131.001text" style="display:none">T0131.001: Legacy Web Content</li>
<li id="T0095text" style="display:none">T0095: Develop Owned Media Assets</li>
<li id="T0137.005text" style="display:none">T0137.005: Extort</li>
<li id="T0089text" style="display:none">T0089: Obtain Private Documents</li>
<li id="T0111.003text" style="display:none">T0111.003: Radio</li>
<li id="T0131.002text" style="display:none">T0131.002: Post Borderline Content</li>
<li id="T0096text" style="display:none">T0096: Leverage Content Farms</li>
<li id="T0137.006text" style="display:none">T0137.006: Manipulate Stocks</li>
<li id="T0089.001text" style="display:none">T0089.001: Obtain Authentic Documents</li>
<li id="T0112text" style="display:none">T0112: Email</li>
<li id="T0096.001text" style="display:none">T0096.001: Create Content Farms</li>
<li id="T0138text" style="display:none">T0138: Motivate to Act</li>
<li id="T0089.002text" style="display:none">T0089.002: Create Inauthentic Documents</li>
<li id="T0096.002text" style="display:none">T0096.002: Outsource Content Creation to External Organisations</li>
<li id="T0138.001text" style="display:none">T0138.001: Encourage</li>
<li id="T0089.003text" style="display:none">T0089.003: Alter Authentic Documents</li>
<li id="T0138.002text" style="display:none">T0138.002: Provoke</li>
<li id="T0138.003text" style="display:none">T0138.003: Compel</li>
<li id="T0139text" style="display:none">T0139: Dissuade from Acting</li>
<li id="T0139.001text" style="display:none">T0139.001: Discourage</li>
<li id="T0139.002text" style="display:none">T0139.002: Silence</li>
<li id="T0139.003text" style="display:none">T0139.003: Deter</li>
<li id="T0140text" style="display:none">T0140: Cause Harm</li>
<li id="T0140.001text" style="display:none">T0140.001: Defame</li>
<li id="T0140.002text" style="display:none">T0140.002: Intimidate</li>
<li id="T0140.003text" style="display:none">T0140.003: Spread Hate</li>
</ul>
</body>

View File

@ -2,32 +2,42 @@ P01,P01,P02,P02,P02,P03,P03,P03,P03,P04,P01,P02,P02,P02,P03,P03
TA01,TA02,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16,TA17,TA18
T0073,T0002,T0016,T0015,T0029,T0020,T0114,T0017,T0059,T0132,T0072,T0003,T0007,T0009,T0049,T0047
T0074,T0066,T0018,T0019,T0043,T0039,T0114.001,T0017.001,T0060,T0132.001,T0072.001,T0004,T0010,T0009.001,T0049.001,T0048
,T0075,T0101,T0019.001,T0043.001,T0042,T0114.002,T0057,T0128,T0132.002,T0072.002,T0022,T0013,T0011,T0049.002,T0048.001
,T0075.001,T0102,T0019.002,T0043.002,T0044,T0115,T0057.001,T0128.001,T0132.003,T0072.003,T0022.001,T0014,T0097,T0049.003,T0048.002
,T0076,T0102.001,T0023,T0103,T0045,T0115.001,T0057.002,T0128.002,T0133,T0072.004,T0022.002,T0014.001,T0097.001,T0049.004,T0048.003
,T0077,T0102.002,T0023.001,T0103.001,T0046,T0115.002,T0061,T0128.003,T0133.001,T0072.005,T0040,T0014.002,T0098,T0049.005,T0048.004
T0074.001,T0075,T0101,T0019.001,T0043.001,T0042,T0114.002,T0057,T0128,T0132.002,T0072.002,T0022,T0013,T0011,T0049.002,T0048.001
T0074.002,T0075.001,T0102,T0019.002,T0043.002,T0044,T0115,T0057.001,T0128.001,T0132.003,T0072.003,T0022.001,T0014,T0097,T0049.003,T0048.002
T0074.003,T0076,T0102.001,T0023,T0103,T0045,T0115.001,T0057.002,T0128.002,T0133,T0072.004,T0022.002,T0014.001,T0097.001,T0049.004,T0048.003
T0074.004,T0077,T0102.002,T0023.001,T0103.001,T0046,T0115.002,T0061,T0128.003,T0133.001,T0072.005,T0040,T0014.002,T0098,T0049.005,T0048.004
,T0078,T0102.003,T0023.002,T0103.002,T0113,T0115.003,T0126,T0128.004,T0133.002,T0080,T0068,T0065,T0098.001,T0049.006,T0123
,T0079,,T0084,T0104,,T0116,T0126.001,T0128.005,T0133.003,T0080.001,T0082,T0090,T0098.002,T0049.007,T0123.001
,,,T0084.001,T0104.001,,T0116.001,T0126.002,T0129,T0133.004,T0080.002,T0083,T0090.001,T0099,T0118,T0123.002
,,,T0084.002,T0104.002,,T0117,T0127,T0129.001,T0133.005,T0080.003,,T0090.002,T0099.001,T0119,T0123.003
,,,T0084.003,T0104.003,,,T0127.001,T0129.002,T0134,T0080.004,,T0090.003,T0099.002,T0119.001,T0123.004
,,,T0084.004,T0104.004,,,T0127.002,T0129.003,T0134.001,T0080.005,,T0090.004,T0100,T0119.002,T0124
,,,T0085,T0104.005,,,,T0129.004,T0134.002,T0081,,T0091,T0100.001,T0119.003,T0124.001
,,,T0085.001,T0104.006,,,,T0129.005,,T0081.001,,T0091.001,T0100.002,T0120,T0124.002
,,,T0085.002,T0105,,,,T0129.006,,T0081.002,,T0091.002,T0100.003,T0120.001,T0124.003
,,,T0085.003,T0105.001,,,,T0129.007,,T0081.003,,T0091.003,,T0120.002,T0125
,,,T0086,T0105.002,,,,T0129.008,,T0081.004,,T0092,,T0121,
,,,T0086.001,T0105.003,,,,T0129.009,,T0081.005,,T0092.001,,T0121.001,
,,,T0086.002,T0106,,,,T0129.010,,T0081.006,,T0092.002,,T0122,
,,,T0086.003,T0106.001,,,,T0130,,T0081.007,,T0092.003,,,
,,,T0086.004,T0107,,,,T0130.001,,T0081.008,,T0093,,,
,,,T0087,T0108,,,,T0130.002,,,,T0093.001,,,
,,,T0087.001,T0109,,,,T0130.003,,,,T0093.002,,,
,,,T0087.002,T0110,,,,T0130.004,,,,T0094,,,
,,,T0088,T0111,,,,T0130.005,,,,T0094.001,,,
,,,T0088.001,T0111.001,,,,T0131,,,,T0094.002,,,
,,,T0088.002,T0111.002,,,,T0131.001,,,,T0095,,,
,,,T0089,T0111.003,,,,T0131.002,,,,T0096,,,
,,,T0089.001,T0112,,,,,,,,T0096.001,,,
,,,T0089.002,,,,,,,,,T0096.002,,,
,,,T0089.003,,,,,,,,,,,,
,T0135,,T0084.001,T0104.001,,T0116.001,T0126.002,T0129,T0133.004,T0080.002,T0083,T0090.001,T0099,T0118,T0123.002
,T0135.001,,T0084.002,T0104.002,,T0117,T0127,T0129.001,T0133.005,T0080.003,,T0090.002,T0099.001,T0119,T0123.003
,T0135.002,,T0084.003,T0104.003,,,T0127.001,T0129.002,T0134,T0080.004,,T0090.003,T0099.002,T0119.001,T0123.004
,T0135.003,,T0084.004,T0104.004,,,T0127.002,T0129.003,T0134.001,T0080.005,,T0090.004,T0100,T0119.002,T0124
,T0135.004,,T0085,T0104.005,,,,T0129.004,T0134.002,T0081,,T0091,T0100.001,T0119.003,T0124.001
,T0136,,T0085.001,T0104.006,,,,T0129.005,,T0081.001,,T0091.001,T0100.002,T0120,T0124.002
,T0136.001,,T0085.002,T0105,,,,T0129.006,,T0081.002,,T0091.002,T0100.003,T0120.001,T0124.003
,T0136.002,,T0085.003,T0105.001,,,,T0129.007,,T0081.003,,T0091.003,,T0120.002,T0125
,T0136.003,,T0086,T0105.002,,,,T0129.008,,T0081.004,,T0092,,T0121,
,T0136.004,,T0086.001,T0105.003,,,,T0129.009,,T0081.005,,T0092.001,,T0121.001,
,T0136.005,,T0086.002,T0106,,,,T0129.010,,T0081.006,,T0092.002,,T0122,
,T0136.006,,T0086.003,T0106.001,,,,T0130,,T0081.007,,T0092.003,,,
,T0136.007,,T0086.004,T0107,,,,T0130.001,,T0081.008,,T0093,,,
,T0136.008,,T0087,T0108,,,,T0130.002,,,,T0093.001,,,
,T0137,,T0087.001,T0109,,,,T0130.003,,,,T0093.002,,,
,T0137.001,,T0087.002,T0110,,,,T0130.004,,,,T0094,,,
,T0137.002,,T0088,T0111,,,,T0130.005,,,,T0094.001,,,
,T0137.003,,T0088.001,T0111.001,,,,T0131,,,,T0094.002,,,
,T0137.004,,T0088.002,T0111.002,,,,T0131.001,,,,T0095,,,
,T0137.005,,T0089,T0111.003,,,,T0131.002,,,,T0096,,,
,T0137.006,,T0089.001,T0112,,,,,,,,T0096.001,,,
,T0138,,T0089.002,,,,,,,,,T0096.002,,,
,T0138.001,,T0089.003,,,,,,,,,,,,
,T0138.002,,,,,,,,,,,,,,
,T0138.003,,,,,,,,,,,,,,
,T0139,,,,,,,,,,,,,,
,T0139.001,,,,,,,,,,,,,,
,T0139.002,,,,,,,,,,,,,,
,T0139.003,,,,,,,,,,,,,,
,T0140,,,,,,,,,,,,,,
,T0140.001,,,,,,,,,,,,,,
,T0140.002,,,,,,,,,,,,,,
,T0140.003,,,,,,,,,,,,,,

1 P01 P01 P02 P02 P02 P03 P03 P03 P03 P04 P01 P02 P02 P02 P03 P03
2 TA01 TA02 TA05 TA06 TA07 TA08 TA09 TA10 TA11 TA12 TA13 TA14 TA15 TA16 TA17 TA18
3 T0073 T0002 T0016 T0015 T0029 T0020 T0114 T0017 T0059 T0132 T0072 T0003 T0007 T0009 T0049 T0047
4 T0074 T0066 T0018 T0019 T0043 T0039 T0114.001 T0017.001 T0060 T0132.001 T0072.001 T0004 T0010 T0009.001 T0049.001 T0048
5 T0074.001 T0075 T0101 T0019.001 T0043.001 T0042 T0114.002 T0057 T0128 T0132.002 T0072.002 T0022 T0013 T0011 T0049.002 T0048.001
6 T0074.002 T0075.001 T0102 T0019.002 T0043.002 T0044 T0115 T0057.001 T0128.001 T0132.003 T0072.003 T0022.001 T0014 T0097 T0049.003 T0048.002
7 T0074.003 T0076 T0102.001 T0023 T0103 T0045 T0115.001 T0057.002 T0128.002 T0133 T0072.004 T0022.002 T0014.001 T0097.001 T0049.004 T0048.003
8 T0074.004 T0077 T0102.002 T0023.001 T0103.001 T0046 T0115.002 T0061 T0128.003 T0133.001 T0072.005 T0040 T0014.002 T0098 T0049.005 T0048.004
9 T0078 T0102.003 T0023.002 T0103.002 T0113 T0115.003 T0126 T0128.004 T0133.002 T0080 T0068 T0065 T0098.001 T0049.006 T0123
10 T0079 T0084 T0104 T0116 T0126.001 T0128.005 T0133.003 T0080.001 T0082 T0090 T0098.002 T0049.007 T0123.001
11 T0135 T0084.001 T0104.001 T0116.001 T0126.002 T0129 T0133.004 T0080.002 T0083 T0090.001 T0099 T0118 T0123.002
12 T0135.001 T0084.002 T0104.002 T0117 T0127 T0129.001 T0133.005 T0080.003 T0090.002 T0099.001 T0119 T0123.003
13 T0135.002 T0084.003 T0104.003 T0127.001 T0129.002 T0134 T0080.004 T0090.003 T0099.002 T0119.001 T0123.004
14 T0135.003 T0084.004 T0104.004 T0127.002 T0129.003 T0134.001 T0080.005 T0090.004 T0100 T0119.002 T0124
15 T0135.004 T0085 T0104.005 T0129.004 T0134.002 T0081 T0091 T0100.001 T0119.003 T0124.001
16 T0136 T0085.001 T0104.006 T0129.005 T0081.001 T0091.001 T0100.002 T0120 T0124.002
17 T0136.001 T0085.002 T0105 T0129.006 T0081.002 T0091.002 T0100.003 T0120.001 T0124.003
18 T0136.002 T0085.003 T0105.001 T0129.007 T0081.003 T0091.003 T0120.002 T0125
19 T0136.003 T0086 T0105.002 T0129.008 T0081.004 T0092 T0121
20 T0136.004 T0086.001 T0105.003 T0129.009 T0081.005 T0092.001 T0121.001
21 T0136.005 T0086.002 T0106 T0129.010 T0081.006 T0092.002 T0122
22 T0136.006 T0086.003 T0106.001 T0130 T0081.007 T0092.003
23 T0136.007 T0086.004 T0107 T0130.001 T0081.008 T0093
24 T0136.008 T0087 T0108 T0130.002 T0093.001
25 T0137 T0087.001 T0109 T0130.003 T0093.002
26 T0137.001 T0087.002 T0110 T0130.004 T0094
27 T0137.002 T0088 T0111 T0130.005 T0094.001
28 T0137.003 T0088.001 T0111.001 T0131 T0094.002
29 T0137.004 T0088.002 T0111.002 T0131.001 T0095
30 T0137.005 T0089 T0111.003 T0131.002 T0096
31 T0137.006 T0089.001 T0112 T0096.001
32 T0138 T0089.002 T0096.002
33 T0138.001 T0089.003
34 T0138.002
35 T0138.003
36 T0139
37 T0139.001
38 T0139.002
39 T0139.003
40 T0140
41 T0140.001
42 T0140.002
43 T0140.003

View File

@ -57,7 +57,7 @@
<td><a href="techniques/T0048.md">T0048 Harass</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0074.001.md">T0074.001 Geopolitical Advantage</a></td>
<td><a href="techniques/T0075.md">T0075 Dismiss</a></td>
<td><a href="techniques/T0101.md">T0101 Create Localised Content</a></td>
<td><a href="techniques/T0019.001.md">T0019.001 Create Fake Research</a></td>
@ -65,7 +65,7 @@
<td><a href="techniques/T0042.md">T0042 Seed Kernel of Truth</a></td>
<td><a href="techniques/T0114.002.md">T0114.002 Traditional Media</a></td>
<td><a href="techniques/T0057.md">T0057 Organise Events</a></td>
<td><a href="techniques/T0128.md">T0128 Conceal People</a></td>
<td><a href="techniques/T0128.md">T0128 Conceal Information Assets</a></td>
<td><a href="techniques/T0132.002.md">T0132.002 Content Focused</a></td>
<td><a href="techniques/T0072.002.md">T0072.002 Demographic Segmentation</a></td>
<td><a href="techniques/T0022.md">T0022 Leverage Conspiracy Theory Narratives</a></td>
@ -75,7 +75,7 @@
<td><a href="techniques/T0048.001.md">T0048.001 Boycott/"Cancel" Opponents</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0074.002.md">T0074.002 Domestic Political Advantage</a></td>
<td><a href="techniques/T0075.001.md">T0075.001 Discredit Credible Sources</a></td>
<td><a href="techniques/T0102.md">T0102 Leverage Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0019.002.md">T0019.002 Hijack Hashtags</a></td>
@ -93,7 +93,7 @@
<td><a href="techniques/T0048.002.md">T0048.002 Harass People Based on Identities</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0074.003.md">T0074.003 Economic Advantage</a></td>
<td><a href="techniques/T0076.md">T0076 Distort</a></td>
<td><a href="techniques/T0102.001.md">T0102.001 Use Existing Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0023.md">T0023 Distort Facts</a></td>
@ -111,7 +111,7 @@
<td><a href="techniques/T0048.003.md">T0048.003 Threaten to Dox</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0074.004.md">T0074.004 Ideological Advantage</a></td>
<td><a href="techniques/T0077.md">T0077 Distract</a></td>
<td><a href="techniques/T0102.002.md">T0102.002 Create Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0023.001.md">T0023.001 Reframe Context</a></td>
@ -137,7 +137,7 @@
<td><a href="techniques/T0113.md">T0113 Employ Commercial Analytic Firms</a></td>
<td><a href="techniques/T0115.003.md">T0115.003 One-Way Direct Posting</a></td>
<td><a href="techniques/T0126.md">T0126 Encourage Attendance at Events</a></td>
<td><a href="techniques/T0128.004.md">T0128.004 Launder Accounts</a></td>
<td><a href="techniques/T0128.004.md">T0128.004 Launder Information Assets</a></td>
<td><a href="techniques/T0133.002.md">T0133.002 Content</a></td>
<td><a href="techniques/T0080.md">T0080 Map Target Audience Information Environment</a></td>
<td><a href="techniques/T0068.md">T0068 Respond to Breaking News Event or Active Crisis</a></td>
@ -155,7 +155,7 @@
<td> </td>
<td><a href="techniques/T0116.md">T0116 Comment or Reply on Content</a></td>
<td><a href="techniques/T0126.001.md">T0126.001 Call to Action to Attend</a></td>
<td><a href="techniques/T0128.005.md">T0128.005 Change Names of Accounts</a></td>
<td><a href="techniques/T0128.005.md">T0128.005 Change Names of Information Assets</a></td>
<td><a href="techniques/T0133.003.md">T0133.003 Awareness</a></td>
<td><a href="techniques/T0080.001.md">T0080.001 Monitor Social Media Analytics</a></td>
<td><a href="techniques/T0082.md">T0082 Develop New Narratives</a></td>
@ -166,7 +166,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0135.md">T0135 Undermine</a></td>
<td> </td>
<td><a href="techniques/T0084.001.md">T0084.001 Use Copypasta</a></td>
<td><a href="techniques/T0104.001.md">T0104.001 Mainstream Social Networks</a></td>
@ -184,7 +184,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0135.001.md">T0135.001 Smear</a></td>
<td> </td>
<td><a href="techniques/T0084.002.md">T0084.002 Plagiarise Content</a></td>
<td><a href="techniques/T0104.002.md">T0104.002 Dating Apps</a></td>
@ -202,7 +202,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0135.002.md">T0135.002 Thwart</a></td>
<td> </td>
<td><a href="techniques/T0084.003.md">T0084.003 Deceptively Labelled or Translated</a></td>
<td><a href="techniques/T0104.003.md">T0104.003 Private/Closed Social Networks</a></td>
@ -220,7 +220,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0135.003.md">T0135.003 Subvert</a></td>
<td> </td>
<td><a href="techniques/T0084.004.md">T0084.004 Appropriate Content</a></td>
<td><a href="techniques/T0104.004.md">T0104.004 Interest-Based Networks</a></td>
@ -238,7 +238,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0135.004.md">T0135.004 Polarise</a></td>
<td> </td>
<td><a href="techniques/T0085.md">T0085 Develop Text-Based Content</a></td>
<td><a href="techniques/T0104.005.md">T0104.005 Use Hashtags</a></td>
@ -256,7 +256,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.md">T0136 Cultivate Support</a></td>
<td> </td>
<td><a href="techniques/T0085.001.md">T0085.001 Develop AI-Generated Text</a></td>
<td><a href="techniques/T0104.006.md">T0104.006 Create Dedicated Hashtag</a></td>
@ -274,7 +274,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.001.md">T0136.001 Defend Reputaton</a></td>
<td> </td>
<td><a href="techniques/T0085.002.md">T0085.002 Develop False or Altered Documents</a></td>
<td><a href="techniques/T0105.md">T0105 Media Sharing Networks</a></td>
@ -292,7 +292,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.002.md">T0136.002 Justify Action</a></td>
<td> </td>
<td><a href="techniques/T0085.003.md">T0085.003 Develop Inauthentic News Articles</a></td>
<td><a href="techniques/T0105.001.md">T0105.001 Photo Sharing</a></td>
@ -310,7 +310,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.003.md">T0136.003 Energise Supporters</a></td>
<td> </td>
<td><a href="techniques/T0086.md">T0086 Develop Image-Based Content</a></td>
<td><a href="techniques/T0105.002.md">T0105.002 Video Sharing</a></td>
@ -328,7 +328,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.004.md">T0136.004 Boost Reputation</a></td>
<td> </td>
<td><a href="techniques/T0086.001.md">T0086.001 Develop Memes</a></td>
<td><a href="techniques/T0105.003.md">T0105.003 Audio Sharing</a></td>
@ -346,7 +346,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.005.md">T0136.005 Cultvate Support for Initiative</a></td>
<td> </td>
<td><a href="techniques/T0086.002.md">T0086.002 Develop AI-Generated Images (Deepfakes)</a></td>
<td><a href="techniques/T0106.md">T0106 Discussion Forums</a></td>
@ -364,7 +364,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.006.md">T0136.006 Cultivate Support for Ally</a></td>
<td> </td>
<td><a href="techniques/T0086.003.md">T0086.003 Deceptively Edit Images (Cheap Fakes)</a></td>
<td><a href="techniques/T0106.001.md">T0106.001 Anonymous Message Boards</a></td>
@ -382,7 +382,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.007.md">T0136.007 Recruit Members</a></td>
<td> </td>
<td><a href="techniques/T0086.004.md">T0086.004 Aggregate Information into Evidence Collages</a></td>
<td><a href="techniques/T0107.md">T0107 Bookmarking and Content Curation</a></td>
@ -400,7 +400,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0136.008.md">T0136.008 Increase Prestige</a></td>
<td> </td>
<td><a href="techniques/T0087.md">T0087 Develop Video-Based Content</a></td>
<td><a href="techniques/T0108.md">T0108 Blogging and Publishing Networks</a></td>
@ -418,7 +418,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0137.md">T0137 Make Money</a></td>
<td> </td>
<td><a href="techniques/T0087.001.md">T0087.001 Develop AI-Generated Videos (Deepfakes)</a></td>
<td><a href="techniques/T0109.md">T0109 Consumer Review Networks</a></td>
@ -436,7 +436,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0137.001.md">T0137.001 Generate Ad Revenue</a></td>
<td> </td>
<td><a href="techniques/T0087.002.md">T0087.002 Deceptively Edit Video (Cheap Fakes)</a></td>
<td><a href="techniques/T0110.md">T0110 Formal Diplomatic Channels</a></td>
@ -454,7 +454,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0137.002.md">T0137.002 Scam</a></td>
<td> </td>
<td><a href="techniques/T0088.md">T0088 Develop Audio-Based Content</a></td>
<td><a href="techniques/T0111.md">T0111 Traditional Media</a></td>
@ -472,7 +472,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0137.003.md">T0137.003 Raise Funds</a></td>
<td> </td>
<td><a href="techniques/T0088.001.md">T0088.001 Develop AI-Generated Audio (Deepfakes)</a></td>
<td><a href="techniques/T0111.001.md">T0111.001 TV</a></td>
@ -490,7 +490,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0137.004.md">T0137.004 Sell Items under False Pretences</a></td>
<td> </td>
<td><a href="techniques/T0088.002.md">T0088.002 Deceptively Edit Audio (Cheap Fakes)</a></td>
<td><a href="techniques/T0111.002.md">T0111.002 Newspaper</a></td>
@ -508,7 +508,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0137.005.md">T0137.005 Extort</a></td>
<td> </td>
<td><a href="techniques/T0089.md">T0089 Obtain Private Documents</a></td>
<td><a href="techniques/T0111.003.md">T0111.003 Radio</a></td>
@ -526,7 +526,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0137.006.md">T0137.006 Manipulate Stocks</a></td>
<td> </td>
<td><a href="techniques/T0089.001.md">T0089.001 Obtain Authentic Documents</a></td>
<td><a href="techniques/T0112.md">T0112 Email</a></td>
@ -544,7 +544,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0138.md">T0138 Motivate to Act</a></td>
<td> </td>
<td><a href="techniques/T0089.002.md">T0089.002 Create Inauthentic Documents</a></td>
<td> </td>
@ -562,7 +562,7 @@
</tr>
<tr>
<td> </td>
<td> </td>
<td><a href="techniques/T0138.001.md">T0138.001 Encourage</a></td>
<td> </td>
<td><a href="techniques/T0089.003.md">T0089.003 Alter Authentic Documents</a></td>
<td> </td>
@ -579,5 +579,185 @@
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0138.002.md">T0138.002 Provoke</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0138.003.md">T0138.003 Compel</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0139.md">T0139 Dissuade from Acting</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0139.001.md">T0139.001 Discourage</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0139.002.md">T0139.002 Silence</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0139.003.md">T0139.003 Deter</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0140.md">T0140 Cause Harm</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0140.001.md">T0140.001 Defame</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0140.002.md">T0140.002 Intimidate</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0140.003.md">T0140.003 Spread Hate</a></td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
</tr>
</table>

View File

@ -19,6 +19,10 @@
| ---------- |
| [T0073 Determine Target Audiences](../../generated_pages/techniques/T0073.md) |
| [T0074 Determine Strategic Ends](../../generated_pages/techniques/T0074.md) |
| [T0074.001 Geopolitical Advantage](../../generated_pages/techniques/T0074.001.md) |
| [T0074.002 Domestic Political Advantage](../../generated_pages/techniques/T0074.002.md) |
| [T0074.003 Economic Advantage](../../generated_pages/techniques/T0074.003.md) |
| [T0074.004 Ideological Advantage](../../generated_pages/techniques/T0074.004.md) |

View File

@ -1,6 +1,6 @@
# Tactic TA02: Plan Objectives
* **Summary:** Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: - Each desired effect should link directly to one or more objectives - The effect should be measurable - The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.
* **Summary:** Set clearly defined, measurable, and achievable objectives. In some cases achieving objectives ties execution of tactical tasks to reaching the desired strategic end state. In other cases, where there is no clearly defined strategic end state, the tactical objective may stand on its own. The objective statement should not specify the way and means of accomplishment but rather the goal the threat actor wishes to achieve.
* **Belongs to phase:** P01
@ -28,6 +28,39 @@
| [T0077 Distract](../../generated_pages/techniques/T0077.md) |
| [T0078 Dismay](../../generated_pages/techniques/T0078.md) |
| [T0079 Divide](../../generated_pages/techniques/T0079.md) |
| [T0135 Undermine](../../generated_pages/techniques/T0135.md) |
| [T0135.001 Smear](../../generated_pages/techniques/T0135.001.md) |
| [T0135.002 Thwart](../../generated_pages/techniques/T0135.002.md) |
| [T0135.003 Subvert](../../generated_pages/techniques/T0135.003.md) |
| [T0135.004 Polarise](../../generated_pages/techniques/T0135.004.md) |
| [T0136 Cultivate Support](../../generated_pages/techniques/T0136.md) |
| [T0136.001 Defend Reputaton](../../generated_pages/techniques/T0136.001.md) |
| [T0136.002 Justify Action](../../generated_pages/techniques/T0136.002.md) |
| [T0136.003 Energise Supporters](../../generated_pages/techniques/T0136.003.md) |
| [T0136.004 Boost Reputation](../../generated_pages/techniques/T0136.004.md) |
| [T0136.005 Cultvate Support for Initiative](../../generated_pages/techniques/T0136.005.md) |
| [T0136.006 Cultivate Support for Ally](../../generated_pages/techniques/T0136.006.md) |
| [T0136.007 Recruit Members](../../generated_pages/techniques/T0136.007.md) |
| [T0136.008 Increase Prestige](../../generated_pages/techniques/T0136.008.md) |
| [T0137 Make Money](../../generated_pages/techniques/T0137.md) |
| [T0137.001 Generate Ad Revenue](../../generated_pages/techniques/T0137.001.md) |
| [T0137.002 Scam](../../generated_pages/techniques/T0137.002.md) |
| [T0137.003 Raise Funds](../../generated_pages/techniques/T0137.003.md) |
| [T0137.004 Sell Items under False Pretences](../../generated_pages/techniques/T0137.004.md) |
| [T0137.005 Extort](../../generated_pages/techniques/T0137.005.md) |
| [T0137.006 Manipulate Stocks](../../generated_pages/techniques/T0137.006.md) |
| [T0138 Motivate to Act](../../generated_pages/techniques/T0138.md) |
| [T0138.001 Encourage](../../generated_pages/techniques/T0138.001.md) |
| [T0138.002 Provoke](../../generated_pages/techniques/T0138.002.md) |
| [T0138.003 Compel](../../generated_pages/techniques/T0138.003.md) |
| [T0139 Dissuade from Acting](../../generated_pages/techniques/T0139.md) |
| [T0139.001 Discourage](../../generated_pages/techniques/T0139.001.md) |
| [T0139.002 Silence](../../generated_pages/techniques/T0139.002.md) |
| [T0139.003 Deter](../../generated_pages/techniques/T0139.003.md) |
| [T0140 Cause Harm](../../generated_pages/techniques/T0140.md) |
| [T0140.001 Defame](../../generated_pages/techniques/T0140.001.md) |
| [T0140.002 Intimidate](../../generated_pages/techniques/T0140.002.md) |
| [T0140.003 Spread Hate](../../generated_pages/techniques/T0140.003.md) |

View File

@ -21,12 +21,12 @@
| ---------- |
| [T0059 Play the Long Game](../../generated_pages/techniques/T0059.md) |
| [T0060 Continue to Amplify](../../generated_pages/techniques/T0060.md) |
| [T0128 Conceal People](../../generated_pages/techniques/T0128.md) |
| [T0128 Conceal Information Assets](../../generated_pages/techniques/T0128.md) |
| [T0128.001 Use Pseudonyms](../../generated_pages/techniques/T0128.001.md) |
| [T0128.002 Conceal Network Identity](../../generated_pages/techniques/T0128.002.md) |
| [T0128.003 Distance Reputable Individuals from Operation](../../generated_pages/techniques/T0128.003.md) |
| [T0128.004 Launder Accounts](../../generated_pages/techniques/T0128.004.md) |
| [T0128.005 Change Names of Accounts](../../generated_pages/techniques/T0128.005.md) |
| [T0128.004 Launder Information Assets](../../generated_pages/techniques/T0128.004.md) |
| [T0128.005 Change Names of Information Assets](../../generated_pages/techniques/T0128.005.md) |
| [T0129 Conceal Operational Activity](../../generated_pages/techniques/T0129.md) |
| [T0129.001 Conceal Network Identity](../../generated_pages/techniques/T0129.001.md) |
| [T0129.002 Generate Content Unrelated to Narrative](../../generated_pages/techniques/T0129.002.md) |

View File

@ -16,7 +16,7 @@
<tr>
<td><a href="tactics/TA02.md">TA02</a></td>
<td>Plan Objectives</td>
<td>Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: - Each desired effect should link directly to one or more objectives - The effect should be measurable - The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.</td>
<td>Set clearly defined, measurable, and achievable objectives. In some cases achieving objectives ties execution of tactical tasks to reaching the desired strategic end state. In other cases, where there is no clearly defined strategic end state, the tactical objective may stand on its own. The objective statement should not specify the way and means of accomplishment but rather the goal the threat actor wishes to achieve. </td>
<td>P01</td>
</tr>
<tr>

View File

@ -0,0 +1,17 @@
# Technique T0074.001: Geopolitical Advantage
* **Summary**: Favourable position on the international stage in terms of great power politics or regional rivalry. Geopolitics plays out in the realms of foreign policy, national security, diplomacy, and intelligence. It involves nation-state governments, heads of state, foreign ministers, intergovernmental organisations, and regional security alliances.
* **Belongs to tactic stage**: TA01
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0074.002: Domestic Political Advantage
* **Summary**: Favourable position vis-à-vis national or sub-national political opponents such as political parties, interest groups, politicians, candidates.
* **Belongs to tactic stage**: TA01
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0074.003: Economic Advantage
* **Summary**: Favourable position domestically or internationally in the realms of commerce, trade, finance, industry. Economics involves nation-states, corporations, banks, trade blocs, industry associations, cartels.
* **Belongs to tactic stage**: TA01
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0074.004: Ideological Advantage
* **Summary**: Favourable position domestically or internationally in the market for ideas, beliefs, and world views. Competition plays out among faith systems, political systems, and value systems. It can involve sub-national, national or supra-national movements.
* **Belongs to tactic stage**: TA01
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -1,6 +1,6 @@
# Technique T0074: Determine Strategic Ends
* **Summary**: Determining the campaigns goals or objectives. Examples include achieving achieving geopolitical advantage like undermining trust in an adversary, gaining domestic political advantage, achieving financial gain, or attaining a policy change,
* **Summary**: These are the long-term end-states the campaign aims to bring about. They typically involve an advantageous position vis-a-vis competitors in terms of power or influence. The strategic goal may be to improve or simply to hold ones position. Competition occurs in the public sphere in the domains of war, diplomacy, politics, economics, and ideology, and can play out between armed groups, nation-states, political parties, corporations, interest groups, or individuals.
* **Belongs to tactic stage**: TA01

View File

@ -1,6 +1,6 @@
# Technique T0128.001: Use Pseudonyms
* **Summary**: An operation may use pseudonyms, or fake names, to mask the identity of operation accounts, publish anonymous content, or otherwise use falsified personas to conceal identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account with the same falsified name.
* **Summary**: An operation may use pseudonyms, or fake names, to mask the identity of operational accounts, channels, pages etc., publish anonymous content, or otherwise use falsified personas to conceal the identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account, channel, or page with the same falsified name.
* **Belongs to tactic stage**: TA11

View File

@ -1,6 +1,6 @@
# Technique T0128.004: Launder Accounts
# Technique T0128.004: Launder Information Assets
* **Summary**: Account laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution.
* **Summary**: Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution.
* **Belongs to tactic stage**: TA11

View File

@ -1,6 +1,6 @@
# Technique T0128.005: Change Names of Accounts
# Technique T0128.005: Change Names of Information Assets
* **Summary**: Changing names of accounts occurs when an operation changes the name of an existing social media account. An operation may change the names of its accounts throughout an operation to avoid detection or alter the names of newly acquired or repurposed accounts to fit operational narratives.
* **Summary**: Changing names or brand names of information assets such as accounts, channels, pages etc. An operation may change the names or brand names of its assets throughout an operation to avoid detection or alter the names of newly acquired or repurposed assets to fit operational narratives.
* **Belongs to tactic stage**: TA11

View File

@ -1,6 +1,6 @@
# Technique T0128: Conceal People
# Technique T0128: Conceal Information Assets
* **Summary**: Conceal the identity or provenance of a campaign account and people assets to avoid takedown and attribution.
* **Summary**: Conceal the identity or provenance of campaign information assets such as accounts, channels, pages etc. to avoid takedown and attribution.
* **Belongs to tactic stage**: TA11

View File

@ -0,0 +1,17 @@
# Technique T0135.001: Smear
* **Summary**: Denigrate, disparage, or discredit an opponent. This is a common tactical objective in political campaigns with a larger strategic goal. It differs from efforts to harm a target through defamation.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0135.002: Thwart
* **Summary**: Prevent the successful outcome of a policy, operation, or initiative. Actors conduct influence operations to stymie or foil proposals, plans, or courses of action which are not in their interest.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0135.003: Subvert
* **Summary**: Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of “active measures” involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0135.004: Polarise
* **Summary**: To cause a target audience to divide into two completely opposing groups. This is a special case of subversion. To divide and conquer is an age-old approach to subverting and overcoming an enemy.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0135: Undermine
* **Summary**: Weaken, debilitate, or subvert a target or their actions. An influence operation may be designed to disparage an opponent; sabotage an opponents systems or processes; compromise an opponents relationships or support system; impair an opponents capability; or thwart an opponents initiative.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.001: Defend Reputaton
* **Summary**: Preserve a positive perception in the publics mind following an accusation or adverse event. When accused of a wrongful act, an actor may engage in denial, counter accusations, whataboutism, or conspiracy theories to distract public attention and attempt to maintain a positive image.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.002: Justify Action
* **Summary**: To convince others to exonerate you of a perceived wrongdoing. When an actor finds it untenable to deny doing something, they may attempt to exonerate themselves with disinformation which claims the action was reasonable. This is a special case of “Defend Reputation”.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.003: Energise Supporters
* **Summary**: Raise the morale of those who support the organisation or group. Invigorate constituents with zeal for the mission or activity. Terrorist groups, political movements, and cults may indoctrinate their supporters with ideologies that are based on warped versions of religion or cause harm to others.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.004: Boost Reputation
* **Summary**: Elevate the estimation of the actor in the publics mind. Improve their image or standing. Public relations professionals use persuasive overt communications to achieve this goal; manipulators use covert disinformation.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.005: Cultvate Support for Initiative
* **Summary**: Elevate or fortify the public backing for a policy, operation, or idea. Domestic and foreign actors can use artificial means to fabricate or amplify public support for a proposal or action.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.006: Cultivate Support for Ally
* **Summary**: Elevate or fortify the public backing for a partner. Governments may interfere in other countries elections by covertly favouring a party or candidate aligned with their interests. They may also mount an influence operation to bolster the reputation of an ally under attack.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.007: Recruit Members
* **Summary**: Motivate followers to join or subscribe as members of the team. Organisations may mount recruitment drives that use propaganda to entice sympathisers to sign up.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136.008: Increase Prestige
* **Summary**: Improve personal standing within a community. Gain fame, approbation, or notoriety. Conspiracy theorists, those with special access, and ideologues can gain prominence in a community by propagating disinformation, leaking confidential documents, or spreading hate.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0136: Cultivate Support
* **Summary**: Grow or maintain the base of support for the actor, ally, or action. This includes hard core recruitment, managing alliances, and generating or maintaining sympathy among a wider audience, including reputation management and public relations. Sub-techniques assume support for actor (self) unless otherwise specified.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0137.001: Generate Ad Revenue
* **Summary**: Earn income from digital advertisements published alongside inauthentic content. Conspiratorial, false, or provocative content drives internet traffic. Content owners earn money from impressions of, or clicks on, or conversions of ads published on their websites, social media profiles, or streaming services, or ads published when their content appears in search engine results. Fraudsters simulate impressions, clicks, and conversions, or they spin up inauthentic sites or social media profiles just to generate ad revenue. Conspiracy theorists and political operators generate ad revenue as a byproduct of their operation or as a means of sustaining their campaign.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0137.002: Scam
* **Summary**: Defraud a target or trick a target into doing something that benefits the attacker. A typical scam is where a fraudster convinces a target to pay for something without the intention of ever delivering anything in return. Alternatively, the fraudster may promise benefits which never materialise, such as a fake cure. Criminals often exploit a fear or crisis or generate a sense of urgency. They may use deepfakes to impersonate authority figures or individuals in distress.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0137.003: Raise Funds
* **Summary**: Solicit donations for a cause. Popular conspiracy theorists can attract financial contributions from their followers. Fighting back against the establishment is a popular crowdfunding narrative.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0137.004: Sell Items under False Pretences
* **Summary**: Offer products for sale under false pretences. Campaigns may hijack or create causes built on disinformation to sell promotional merchandise. Or charlatans may amplify victims unfounded fears to sell them items of questionable utility such as supplements or survival gear.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0137.005: Extort
* **Summary**: Coerce money or favours from a target by threatening to expose or corrupt information. Ransomware criminals typically demand money. Intelligence agencies demand national secrets. Sexual predators demand favours. The leverage may be critical, sensitive, or embarrassing information.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0137.006: Manipulate Stocks
* **Summary**: Artificially inflate or deflate the price of stocks or other financial instruments and then trade on these to make profit. The most common securities fraud schemes are called “pump and dump” and “poop and scoop”.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0137: Make Money
* **Summary**: Profit from disinformation, conspiracy theories, or online harm. In some cases, the sole objective is financial gain, in other cases the objective is both financial and political. Making money may also be a way to sustain a political campaign.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0138.001: Encourage
* **Summary**: Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0138.002: Provoke
* **Summary**: Instigate, incite, or arouse a target to act. Social media manipulators exploit moral outrage to propel targets to spread hate, take to the streets to protest, or engage in acts of violence.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0138.003: Compel
* **Summary**: Force target to take an action or to stop taking an action it has already started. Actors can use the threat of reputational damage alongside military or economic threats to compel a target.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0138: Motivate to Act
* **Summary**: Persuade, impel, or provoke the target to behave in a specific manner favourable to the attacker. Some common behaviours are joining, subscribing, voting, buying, demonstrating, fighting, retreating, resigning, boycotting.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0139.001: Discourage
* **Summary**: Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0139.002: Silence
* **Summary**: Intimidate or incentivise target into remaining silent or prevent target from speaking out. A threat actor may cow a target into silence as a special case of deterrence. Or they may buy the targets silence. Or they may repress or restrict the targets speech.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0139.003: Deter
* **Summary**: Prevent target from taking an action for fear of the consequences. Deterrence occurs in the mind of the target, who fears they will be worse off if they take an action than if they dont. When making threats, aggressors may bluff, feign irrationality, or engage in brinksmanship.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0139: Dissuade from Acting
* **Summary**: Discourage, deter, or inhibit the target from actions which would be unfavourable to the attacker. The actor may want the target to refrain from voting, buying, fighting, or supplying.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0140.001: Defame
* **Summary**: Attempt to damage the targets personal reputation by impugning their character. This can range from subtle attempts to misrepresent or insinuate, to obvious attempts to denigrate or disparage, to blatant attempts to malign or vilify. Slander applies to oral expression. Libel applies to written or pictorial material. Defamation is often carried out by online trolls.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0140.002: Intimidate
* **Summary**: Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0140.003: Spread Hate
* **Summary**: Publish and/or propagate demeaning, derisive, or humiliating content targeting an individual or group of individuals with the intent to cause emotional, psychological, or physical distress. Hate speech can cause harm directly or incite others to harm the target. It often aims to stigmatise the target by singling out immutable characteristics such as colour, race, religion, national or ethnic origin, gender, gender identity, sexual orientation, age, disease, or mental or physical disability. Thus, promoting hatred online may involve racism, antisemitism, Islamophobia, xenophobia, sexism, misogyny, homophobia, transphobia, ageism, ableism, or any combination thereof. Motivations for hate speech range from group preservation to ideological superiority to the unbridled infliction of suffering.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0140: Cause Harm
* **Summary**: Persecute, malign, or inflict pain upon a target. The objective of a campaign may be to cause fear or emotional distress in a target. In some cases, harm is instrumental to achieving a primary objective, as in coercion, repression, or intimidation. In other cases, harm may be inflicted for the satisfaction of the perpetrator, as in revenge or sadistic cruelty.
* **Belongs to tactic stage**: TA02
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -412,7 +412,31 @@
<tr>
<td><a href="techniques/T0074.md">T0074</a></td>
<td>Determine Strategic Ends</td>
<td>Determining the campaigns goals or objectives. Examples include achieving achieving geopolitical advantage like undermining trust in an adversary, gaining domestic political advantage, achieving financial gain, or attaining a policy change,</td>
<td>These are the long-term end-states the campaign aims to bring about. They typically involve an advantageous position vis-a-vis competitors in terms of power or influence. The strategic goal may be to improve or simply to hold ones position. Competition occurs in the public sphere in the domains of war, diplomacy, politics, economics, and ideology, and can play out between armed groups, nation-states, political parties, corporations, interest groups, or individuals. </td>
<td>TA01</td>
</tr>
<tr>
<td><a href="techniques/T0074.001.md">T0074.001</a></td>
<td>Geopolitical Advantage</td>
<td>Favourable position on the international stage in terms of great power politics or regional rivalry. Geopolitics plays out in the realms of foreign policy, national security, diplomacy, and intelligence. It involves nation-state governments, heads of state, foreign ministers, intergovernmental organisations, and regional security alliances.</td>
<td>TA01</td>
</tr>
<tr>
<td><a href="techniques/T0074.002.md">T0074.002</a></td>
<td>Domestic Political Advantage</td>
<td>Favourable position vis-à-vis national or sub-national political opponents such as political parties, interest groups, politicians, candidates. </td>
<td>TA01</td>
</tr>
<tr>
<td><a href="techniques/T0074.003.md">T0074.003</a></td>
<td>Economic Advantage</td>
<td>Favourable position domestically or internationally in the realms of commerce, trade, finance, industry. Economics involves nation-states, corporations, banks, trade blocs, industry associations, cartels. </td>
<td>TA01</td>
</tr>
<tr>
<td><a href="techniques/T0074.004.md">T0074.004</a></td>
<td>Ideological Advantage</td>
<td>Favourable position domestically or internationally in the market for ideas, beliefs, and world views. Competition plays out among faith systems, political systems, and value systems. It can involve sub-national, national or supra-national movements. </td>
<td>TA01</td>
</tr>
<tr>
@ -1317,14 +1341,14 @@
</tr>
<tr>
<td><a href="techniques/T0128.md">T0128</a></td>
<td>Conceal People</td>
<td>Conceal the identity or provenance of a campaign account and people assets to avoid takedown and attribution.</td>
<td>Conceal Information Assets</td>
<td>Conceal the identity or provenance of campaign information assets such as accounts, channels, pages etc. to avoid takedown and attribution.</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0128.001.md">T0128.001</a></td>
<td>Use Pseudonyms</td>
<td>An operation may use pseudonyms, or fake names, to mask the identity of operation accounts, publish anonymous content, or otherwise use falsified personas to conceal identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account with the same falsified name.</td>
<td>An operation may use pseudonyms, or fake names, to mask the identity of operational accounts, channels, pages etc., publish anonymous content, or otherwise use falsified personas to conceal the identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account, channel, or page with the same falsified name.</td>
<td>TA11</td>
</tr>
<tr>
@ -1341,14 +1365,14 @@
</tr>
<tr>
<td><a href="techniques/T0128.004.md">T0128.004</a></td>
<td>Launder Accounts</td>
<td>Account laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution.</td>
<td>Launder Information Assets</td>
<td>Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution.</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0128.005.md">T0128.005</a></td>
<td>Change Names of Accounts</td>
<td>Changing names of accounts occurs when an operation changes the name of an existing social media account. An operation may change the names of its accounts throughout an operation to avoid detection or alter the names of newly acquired or repurposed accounts to fit operational narratives.</td>
<td>Change Names of Information Assets</td>
<td>Changing names or brand names of information assets such as accounts, channels, pages etc. An operation may change the names or brand names of its assets throughout an operation to avoid detection or alter the names of newly acquired or repurposed assets to fit operational narratives.</td>
<td>TA11</td>
</tr>
<tr>
@ -1549,4 +1573,202 @@
<td>Monitor and evaluate social media engagement in misinformation incidents.</td>
<td>TA12</td>
</tr>
<tr>
<td><a href="techniques/T0135.md">T0135</a></td>
<td>Undermine</td>
<td>Weaken, debilitate, or subvert a target or their actions. An influence operation may be designed to disparage an opponent; sabotage an opponents systems or processes; compromise an opponents relationships or support system; impair an opponents capability; or thwart an opponents initiative. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0135.001.md">T0135.001</a></td>
<td>Smear</td>
<td>Denigrate, disparage, or discredit an opponent. This is a common tactical objective in political campaigns with a larger strategic goal. It differs from efforts to harm a target through defamation.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0135.002.md">T0135.002</a></td>
<td>Thwart</td>
<td>Prevent the successful outcome of a policy, operation, or initiative. Actors conduct influence operations to stymie or foil proposals, plans, or courses of action which are not in their interest. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0135.003.md">T0135.003</a></td>
<td>Subvert</td>
<td>Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of “active measures” involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0135.004.md">T0135.004</a></td>
<td>Polarise</td>
<td>To cause a target audience to divide into two completely opposing groups. This is a special case of subversion. To divide and conquer is an age-old approach to subverting and overcoming an enemy.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.md">T0136</a></td>
<td>Cultivate Support</td>
<td>Grow or maintain the base of support for the actor, ally, or action. This includes hard core recruitment, managing alliances, and generating or maintaining sympathy among a wider audience, including reputation management and public relations. Sub-techniques assume support for actor (self) unless otherwise specified. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.001.md">T0136.001</a></td>
<td>Defend Reputaton</td>
<td>Preserve a positive perception in the publics mind following an accusation or adverse event. When accused of a wrongful act, an actor may engage in denial, counter accusations, whataboutism, or conspiracy theories to distract public attention and attempt to maintain a positive image. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.002.md">T0136.002</a></td>
<td>Justify Action</td>
<td>To convince others to exonerate you of a perceived wrongdoing. When an actor finds it untenable to deny doing something, they may attempt to exonerate themselves with disinformation which claims the action was reasonable. This is a special case of “Defend Reputation”. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.003.md">T0136.003</a></td>
<td>Energise Supporters</td>
<td>Raise the morale of those who support the organisation or group. Invigorate constituents with zeal for the mission or activity. Terrorist groups, political movements, and cults may indoctrinate their supporters with ideologies that are based on warped versions of religion or cause harm to others. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.004.md">T0136.004</a></td>
<td>Boost Reputation</td>
<td>Elevate the estimation of the actor in the publics mind. Improve their image or standing. Public relations professionals use persuasive overt communications to achieve this goal; manipulators use covert disinformation. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.005.md">T0136.005</a></td>
<td>Cultvate Support for Initiative</td>
<td>Elevate or fortify the public backing for a policy, operation, or idea. Domestic and foreign actors can use artificial means to fabricate or amplify public support for a proposal or action. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.006.md">T0136.006</a></td>
<td>Cultivate Support for Ally</td>
<td>Elevate or fortify the public backing for a partner. Governments may interfere in other countries elections by covertly favouring a party or candidate aligned with their interests. They may also mount an influence operation to bolster the reputation of an ally under attack. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.007.md">T0136.007</a></td>
<td>Recruit Members</td>
<td>Motivate followers to join or subscribe as members of the team. Organisations may mount recruitment drives that use propaganda to entice sympathisers to sign up. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0136.008.md">T0136.008</a></td>
<td>Increase Prestige</td>
<td>Improve personal standing within a community. Gain fame, approbation, or notoriety. Conspiracy theorists, those with special access, and ideologues can gain prominence in a community by propagating disinformation, leaking confidential documents, or spreading hate. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0137.md">T0137</a></td>
<td>Make Money</td>
<td>Profit from disinformation, conspiracy theories, or online harm. In some cases, the sole objective is financial gain, in other cases the objective is both financial and political. Making money may also be a way to sustain a political campaign. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0137.001.md">T0137.001</a></td>
<td>Generate Ad Revenue</td>
<td>Earn income from digital advertisements published alongside inauthentic content. Conspiratorial, false, or provocative content drives internet traffic. Content owners earn money from impressions of, or clicks on, or conversions of ads published on their websites, social media profiles, or streaming services, or ads published when their content appears in search engine results. Fraudsters simulate impressions, clicks, and conversions, or they spin up inauthentic sites or social media profiles just to generate ad revenue. Conspiracy theorists and political operators generate ad revenue as a byproduct of their operation or as a means of sustaining their campaign. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0137.002.md">T0137.002</a></td>
<td>Scam</td>
<td>Defraud a target or trick a target into doing something that benefits the attacker. A typical scam is where a fraudster convinces a target to pay for something without the intention of ever delivering anything in return. Alternatively, the fraudster may promise benefits which never materialise, such as a fake cure. Criminals often exploit a fear or crisis or generate a sense of urgency. They may use deepfakes to impersonate authority figures or individuals in distress. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0137.003.md">T0137.003</a></td>
<td>Raise Funds</td>
<td>Solicit donations for a cause. Popular conspiracy theorists can attract financial contributions from their followers. Fighting back against the establishment is a popular crowdfunding narrative. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0137.004.md">T0137.004</a></td>
<td>Sell Items under False Pretences</td>
<td>Offer products for sale under false pretences. Campaigns may hijack or create causes built on disinformation to sell promotional merchandise. Or charlatans may amplify victims unfounded fears to sell them items of questionable utility such as supplements or survival gear. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0137.005.md">T0137.005</a></td>
<td>Extort</td>
<td>Coerce money or favours from a target by threatening to expose or corrupt information. Ransomware criminals typically demand money. Intelligence agencies demand national secrets. Sexual predators demand favours. The leverage may be critical, sensitive, or embarrassing information. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0137.006.md">T0137.006</a></td>
<td>Manipulate Stocks</td>
<td>Artificially inflate or deflate the price of stocks or other financial instruments and then trade on these to make profit. The most common securities fraud schemes are called “pump and dump” and “poop and scoop”. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0138.md">T0138</a></td>
<td>Motivate to Act</td>
<td>Persuade, impel, or provoke the target to behave in a specific manner favourable to the attacker. Some common behaviours are joining, subscribing, voting, buying, demonstrating, fighting, retreating, resigning, boycotting.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0138.001.md">T0138.001</a></td>
<td>Encourage</td>
<td>Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0138.002.md">T0138.002</a></td>
<td>Provoke</td>
<td>Instigate, incite, or arouse a target to act. Social media manipulators exploit moral outrage to propel targets to spread hate, take to the streets to protest, or engage in acts of violence. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0138.003.md">T0138.003</a></td>
<td>Compel</td>
<td>Force target to take an action or to stop taking an action it has already started. Actors can use the threat of reputational damage alongside military or economic threats to compel a target.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0139.md">T0139</a></td>
<td>Dissuade from Acting</td>
<td>Discourage, deter, or inhibit the target from actions which would be unfavourable to the attacker. The actor may want the target to refrain from voting, buying, fighting, or supplying. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0139.001.md">T0139.001</a></td>
<td>Discourage</td>
<td>Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0139.002.md">T0139.002</a></td>
<td>Silence</td>
<td>Intimidate or incentivise target into remaining silent or prevent target from speaking out. A threat actor may cow a target into silence as a special case of deterrence. Or they may buy the targets silence. Or they may repress or restrict the targets speech. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0139.003.md">T0139.003</a></td>
<td>Deter</td>
<td>Prevent target from taking an action for fear of the consequences. Deterrence occurs in the mind of the target, who fears they will be worse off if they take an action than if they dont. When making threats, aggressors may bluff, feign irrationality, or engage in brinksmanship.</td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0140.md">T0140</a></td>
<td>Cause Harm</td>
<td>Persecute, malign, or inflict pain upon a target. The objective of a campaign may be to cause fear or emotional distress in a target. In some cases, harm is instrumental to achieving a primary objective, as in coercion, repression, or intimidation. In other cases, harm may be inflicted for the satisfaction of the perpetrator, as in revenge or sadistic cruelty. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0140.001.md">T0140.001</a></td>
<td>Defame</td>
<td>Attempt to damage the targets personal reputation by impugning their character. This can range from subtle attempts to misrepresent or insinuate, to obvious attempts to denigrate or disparage, to blatant attempts to malign or vilify. Slander applies to oral expression. Libel applies to written or pictorial material. Defamation is often carried out by online trolls. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0140.002.md">T0140.002</a></td>
<td>Intimidate</td>
<td>Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0140.003.md">T0140.003</a></td>
<td>Spread Hate</td>
<td>Publish and/or propagate demeaning, derisive, or humiliating content targeting an individual or group of individuals with the intent to cause emotional, psychological, or physical distress. Hate speech can cause harm directly or incite others to harm the target. It often aims to stigmatise the target by singling out immutable characteristics such as colour, race, religion, national or ethnic origin, gender, gender identity, sexual orientation, age, disease, or mental or physical disability. Thus, promoting hatred online may involve racism, antisemitism, Islamophobia, xenophobia, sexism, misogyny, homophobia, transphobia, ageism, ableism, or any combination thereof. Motivations for hate speech range from group preservation to ideological superiority to the unbridled infliction of suffering. </td>
<td>TA02</td>
</tr>
</table>