diff --git a/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx b/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx index 318deb7..04b49c8 100644 Binary files a/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx and b/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx differ diff --git a/generated_files/disarm_red_framework_clickable.html b/generated_files/disarm_red_framework_clickable.html index 7cd54e0..ee4d2ef 100644 --- a/generated_files/disarm_red_framework_clickable.html +++ b/generated_files/disarm_red_framework_clickable.html @@ -96,7 +96,7 @@ function handleTechniqueClick(box) { T0048 Harass - +T0074.001 Geopolitical Advantage T0075 Dismiss T0101 Create Localised Content T0019.001 Create Fake Research @@ -104,7 +104,7 @@ function handleTechniqueClick(box) { T0042 Seed Kernel of Truth T0114.002 Traditional Media T0057 Organise Events -T0128 Conceal People +T0128 Conceal Information Assets T0132.002 Content Focused T0072.002 Demographic Segmentation T0022 Leverage Conspiracy Theory Narratives @@ -114,7 +114,7 @@ function handleTechniqueClick(box) { T0048.001 Boycott/"Cancel" Opponents - +T0074.002 Domestic Political Advantage T0075.001 Discredit Credible Sources T0102 Leverage Echo Chambers/Filter Bubbles T0019.002 Hijack Hashtags @@ -132,7 +132,7 @@ function handleTechniqueClick(box) { T0048.002 Harass People Based on Identities - +T0074.003 Economic Advantage T0076 Distort T0102.001 Use Existing Echo Chambers/Filter Bubbles T0023 Distort Facts @@ -150,7 +150,7 @@ function handleTechniqueClick(box) { T0048.003 Threaten to Dox - +T0074.004 Ideological Advantage T0077 Distract T0102.002 Create Echo Chambers/Filter Bubbles T0023.001 Reframe Context @@ -176,7 +176,7 @@ function handleTechniqueClick(box) { T0113 Employ Commercial Analytic Firms T0115.003 One-Way Direct Posting T0126 Encourage Attendance at Events -T0128.004 Launder Accounts +T0128.004 Launder Information Assets T0133.002 Content T0080 Map Target Audience Information Environment T0068 Respond to Breaking News Event or Active Crisis @@ -194,7 +194,7 @@ function handleTechniqueClick(box) { T0116 Comment or Reply on Content T0126.001 Call to Action to Attend -T0128.005 Change Names of Accounts +T0128.005 Change Names of Information Assets T0133.003 Awareness T0080.001 Monitor Social Media Analytics T0082 Develop New Narratives @@ -205,7 +205,7 @@ function handleTechniqueClick(box) { - +T0135 Undermine T0084.001 Use Copypasta T0104.001 Mainstream Social Networks @@ -223,7 +223,7 @@ function handleTechniqueClick(box) { - +T0135.001 Smear T0084.002 Plagiarise Content T0104.002 Dating Apps @@ -241,7 +241,7 @@ function handleTechniqueClick(box) { - +T0135.002 Thwart T0084.003 Deceptively Labelled or Translated T0104.003 Private/Closed Social Networks @@ -259,7 +259,7 @@ function handleTechniqueClick(box) { - +T0135.003 Subvert T0084.004 Appropriate Content T0104.004 Interest-Based Networks @@ -277,7 +277,7 @@ function handleTechniqueClick(box) { - +T0135.004 Polarise T0085 Develop Text-Based Content T0104.005 Use Hashtags @@ -295,7 +295,7 @@ function handleTechniqueClick(box) { - +T0136 Cultivate Support T0085.001 Develop AI-Generated Text T0104.006 Create Dedicated Hashtag @@ -313,7 +313,7 @@ function handleTechniqueClick(box) { - +T0136.001 Defend Reputaton T0085.002 Develop False or Altered Documents T0105 Media Sharing Networks @@ -331,7 +331,7 @@ function handleTechniqueClick(box) { - +T0136.002 Justify Action T0085.003 Develop Inauthentic News Articles T0105.001 Photo Sharing @@ -349,7 +349,7 @@ function handleTechniqueClick(box) { - +T0136.003 Energise Supporters T0086 Develop Image-Based Content T0105.002 Video Sharing @@ -367,7 +367,7 @@ function handleTechniqueClick(box) { - +T0136.004 Boost Reputation T0086.001 Develop Memes T0105.003 Audio Sharing @@ -385,7 +385,7 @@ function handleTechniqueClick(box) { - +T0136.005 Cultvate Support for Initiative T0086.002 Develop AI-Generated Images (Deepfakes) T0106 Discussion Forums @@ -403,7 +403,7 @@ function handleTechniqueClick(box) { - +T0136.006 Cultivate Support for Ally T0086.003 Deceptively Edit Images (Cheap Fakes) T0106.001 Anonymous Message Boards @@ -421,7 +421,7 @@ function handleTechniqueClick(box) { - +T0136.007 Recruit Members T0086.004 Aggregate Information into Evidence Collages T0107 Bookmarking and Content Curation @@ -439,7 +439,7 @@ function handleTechniqueClick(box) { - +T0136.008 Increase Prestige T0087 Develop Video-Based Content T0108 Blogging and Publishing Networks @@ -457,7 +457,7 @@ function handleTechniqueClick(box) { - +T0137 Make Money T0087.001 Develop AI-Generated Videos (Deepfakes) T0109 Consumer Review Networks @@ -475,7 +475,7 @@ function handleTechniqueClick(box) { - +T0137.001 Generate Ad Revenue T0087.002 Deceptively Edit Video (Cheap Fakes) T0110 Formal Diplomatic Channels @@ -493,7 +493,7 @@ function handleTechniqueClick(box) { - +T0137.002 Scam T0088 Develop Audio-Based Content T0111 Traditional Media @@ -511,7 +511,7 @@ function handleTechniqueClick(box) { - +T0137.003 Raise Funds T0088.001 Develop AI-Generated Audio (Deepfakes) T0111.001 TV @@ -529,7 +529,7 @@ function handleTechniqueClick(box) { - +T0137.004 Sell Items under False Pretences T0088.002 Deceptively Edit Audio (Cheap Fakes) T0111.002 Newspaper @@ -547,7 +547,7 @@ function handleTechniqueClick(box) { - +T0137.005 Extort T0089 Obtain Private Documents T0111.003 Radio @@ -565,7 +565,7 @@ function handleTechniqueClick(box) { - +T0137.006 Manipulate Stocks T0089.001 Obtain Authentic Documents T0112 Email @@ -583,7 +583,7 @@ function handleTechniqueClick(box) { - +T0138 Motivate to Act T0089.002 Create Inauthentic Documents @@ -601,7 +601,7 @@ function handleTechniqueClick(box) { - +T0138.001 Encourage T0089.003 Alter Authentic Documents @@ -618,6 +618,186 @@ function handleTechniqueClick(box) { + +T0138.002 Provoke + + + + + + + + + + + + + + + + + +T0138.003 Compel + + + + + + + + + + + + + + + + + +T0139 Dissuade from Acting + + + + + + + + + + + + + + + + + +T0139.001 Discourage + + + + + + + + + + + + + + + + + +T0139.002 Silence + + + + + + + + + + + + + + + + + +T0139.003 Deter + + + + + + + + + + + + + + + + + +T0140 Cause Harm + + + + + + + + + + + + + + + + + +T0140.001 Defame + + + + + + + + + + + + + + + + + +T0140.002 Intimidate + + + + + + + + + + + + + + + + + +T0140.003 Spread Hate + + + + + + + + + + + + + + + +
@@ -654,6 +834,7 @@ function handleTechniqueClick(box) { + @@ -661,7 +842,7 @@ function handleTechniqueClick(box) { - + @@ -669,6 +850,7 @@ function handleTechniqueClick(box) { + @@ -684,6 +866,7 @@ function handleTechniqueClick(box) { + @@ -699,6 +882,7 @@ function handleTechniqueClick(box) { + @@ -721,7 +905,7 @@ function handleTechniqueClick(box) { - + @@ -734,7 +918,7 @@ function handleTechniqueClick(box) { - + @@ -742,6 +926,7 @@ function handleTechniqueClick(box) { + @@ -754,6 +939,7 @@ function handleTechniqueClick(box) { + @@ -765,6 +951,7 @@ function handleTechniqueClick(box) { + @@ -775,6 +962,7 @@ function handleTechniqueClick(box) { + @@ -785,6 +973,7 @@ function handleTechniqueClick(box) { + @@ -794,6 +983,7 @@ function handleTechniqueClick(box) { + @@ -802,6 +992,7 @@ function handleTechniqueClick(box) { + @@ -810,6 +1001,7 @@ function handleTechniqueClick(box) { + @@ -817,68 +1009,93 @@ function handleTechniqueClick(box) { + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/generated_files/red_framework_ids.csv b/generated_files/red_framework_ids.csv index e8111a3..c2315ce 100644 --- a/generated_files/red_framework_ids.csv +++ b/generated_files/red_framework_ids.csv @@ -2,32 +2,42 @@ P01,P01,P02,P02,P02,P03,P03,P03,P03,P04,P01,P02,P02,P02,P03,P03 TA01,TA02,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16,TA17,TA18 T0073,T0002,T0016,T0015,T0029,T0020,T0114,T0017,T0059,T0132,T0072,T0003,T0007,T0009,T0049,T0047 T0074,T0066,T0018,T0019,T0043,T0039,T0114.001,T0017.001,T0060,T0132.001,T0072.001,T0004,T0010,T0009.001,T0049.001,T0048 -,T0075,T0101,T0019.001,T0043.001,T0042,T0114.002,T0057,T0128,T0132.002,T0072.002,T0022,T0013,T0011,T0049.002,T0048.001 -,T0075.001,T0102,T0019.002,T0043.002,T0044,T0115,T0057.001,T0128.001,T0132.003,T0072.003,T0022.001,T0014,T0097,T0049.003,T0048.002 -,T0076,T0102.001,T0023,T0103,T0045,T0115.001,T0057.002,T0128.002,T0133,T0072.004,T0022.002,T0014.001,T0097.001,T0049.004,T0048.003 -,T0077,T0102.002,T0023.001,T0103.001,T0046,T0115.002,T0061,T0128.003,T0133.001,T0072.005,T0040,T0014.002,T0098,T0049.005,T0048.004 +T0074.001,T0075,T0101,T0019.001,T0043.001,T0042,T0114.002,T0057,T0128,T0132.002,T0072.002,T0022,T0013,T0011,T0049.002,T0048.001 +T0074.002,T0075.001,T0102,T0019.002,T0043.002,T0044,T0115,T0057.001,T0128.001,T0132.003,T0072.003,T0022.001,T0014,T0097,T0049.003,T0048.002 +T0074.003,T0076,T0102.001,T0023,T0103,T0045,T0115.001,T0057.002,T0128.002,T0133,T0072.004,T0022.002,T0014.001,T0097.001,T0049.004,T0048.003 +T0074.004,T0077,T0102.002,T0023.001,T0103.001,T0046,T0115.002,T0061,T0128.003,T0133.001,T0072.005,T0040,T0014.002,T0098,T0049.005,T0048.004 ,T0078,T0102.003,T0023.002,T0103.002,T0113,T0115.003,T0126,T0128.004,T0133.002,T0080,T0068,T0065,T0098.001,T0049.006,T0123 ,T0079,,T0084,T0104,,T0116,T0126.001,T0128.005,T0133.003,T0080.001,T0082,T0090,T0098.002,T0049.007,T0123.001 -,,,T0084.001,T0104.001,,T0116.001,T0126.002,T0129,T0133.004,T0080.002,T0083,T0090.001,T0099,T0118,T0123.002 -,,,T0084.002,T0104.002,,T0117,T0127,T0129.001,T0133.005,T0080.003,,T0090.002,T0099.001,T0119,T0123.003 -,,,T0084.003,T0104.003,,,T0127.001,T0129.002,T0134,T0080.004,,T0090.003,T0099.002,T0119.001,T0123.004 -,,,T0084.004,T0104.004,,,T0127.002,T0129.003,T0134.001,T0080.005,,T0090.004,T0100,T0119.002,T0124 -,,,T0085,T0104.005,,,,T0129.004,T0134.002,T0081,,T0091,T0100.001,T0119.003,T0124.001 -,,,T0085.001,T0104.006,,,,T0129.005,,T0081.001,,T0091.001,T0100.002,T0120,T0124.002 -,,,T0085.002,T0105,,,,T0129.006,,T0081.002,,T0091.002,T0100.003,T0120.001,T0124.003 -,,,T0085.003,T0105.001,,,,T0129.007,,T0081.003,,T0091.003,,T0120.002,T0125 -,,,T0086,T0105.002,,,,T0129.008,,T0081.004,,T0092,,T0121, -,,,T0086.001,T0105.003,,,,T0129.009,,T0081.005,,T0092.001,,T0121.001, -,,,T0086.002,T0106,,,,T0129.010,,T0081.006,,T0092.002,,T0122, -,,,T0086.003,T0106.001,,,,T0130,,T0081.007,,T0092.003,,, -,,,T0086.004,T0107,,,,T0130.001,,T0081.008,,T0093,,, -,,,T0087,T0108,,,,T0130.002,,,,T0093.001,,, -,,,T0087.001,T0109,,,,T0130.003,,,,T0093.002,,, -,,,T0087.002,T0110,,,,T0130.004,,,,T0094,,, -,,,T0088,T0111,,,,T0130.005,,,,T0094.001,,, -,,,T0088.001,T0111.001,,,,T0131,,,,T0094.002,,, -,,,T0088.002,T0111.002,,,,T0131.001,,,,T0095,,, -,,,T0089,T0111.003,,,,T0131.002,,,,T0096,,, -,,,T0089.001,T0112,,,,,,,,T0096.001,,, -,,,T0089.002,,,,,,,,,T0096.002,,, -,,,T0089.003,,,,,,,,,,,, +,T0135,,T0084.001,T0104.001,,T0116.001,T0126.002,T0129,T0133.004,T0080.002,T0083,T0090.001,T0099,T0118,T0123.002 +,T0135.001,,T0084.002,T0104.002,,T0117,T0127,T0129.001,T0133.005,T0080.003,,T0090.002,T0099.001,T0119,T0123.003 +,T0135.002,,T0084.003,T0104.003,,,T0127.001,T0129.002,T0134,T0080.004,,T0090.003,T0099.002,T0119.001,T0123.004 +,T0135.003,,T0084.004,T0104.004,,,T0127.002,T0129.003,T0134.001,T0080.005,,T0090.004,T0100,T0119.002,T0124 +,T0135.004,,T0085,T0104.005,,,,T0129.004,T0134.002,T0081,,T0091,T0100.001,T0119.003,T0124.001 +,T0136,,T0085.001,T0104.006,,,,T0129.005,,T0081.001,,T0091.001,T0100.002,T0120,T0124.002 +,T0136.001,,T0085.002,T0105,,,,T0129.006,,T0081.002,,T0091.002,T0100.003,T0120.001,T0124.003 +,T0136.002,,T0085.003,T0105.001,,,,T0129.007,,T0081.003,,T0091.003,,T0120.002,T0125 +,T0136.003,,T0086,T0105.002,,,,T0129.008,,T0081.004,,T0092,,T0121, +,T0136.004,,T0086.001,T0105.003,,,,T0129.009,,T0081.005,,T0092.001,,T0121.001, +,T0136.005,,T0086.002,T0106,,,,T0129.010,,T0081.006,,T0092.002,,T0122, +,T0136.006,,T0086.003,T0106.001,,,,T0130,,T0081.007,,T0092.003,,, +,T0136.007,,T0086.004,T0107,,,,T0130.001,,T0081.008,,T0093,,, +,T0136.008,,T0087,T0108,,,,T0130.002,,,,T0093.001,,, +,T0137,,T0087.001,T0109,,,,T0130.003,,,,T0093.002,,, +,T0137.001,,T0087.002,T0110,,,,T0130.004,,,,T0094,,, +,T0137.002,,T0088,T0111,,,,T0130.005,,,,T0094.001,,, +,T0137.003,,T0088.001,T0111.001,,,,T0131,,,,T0094.002,,, +,T0137.004,,T0088.002,T0111.002,,,,T0131.001,,,,T0095,,, +,T0137.005,,T0089,T0111.003,,,,T0131.002,,,,T0096,,, +,T0137.006,,T0089.001,T0112,,,,,,,,T0096.001,,, +,T0138,,T0089.002,,,,,,,,,T0096.002,,, +,T0138.001,,T0089.003,,,,,,,,,,,, +,T0138.002,,,,,,,,,,,,,, +,T0138.003,,,,,,,,,,,,,, +,T0139,,,,,,,,,,,,,, +,T0139.001,,,,,,,,,,,,,, +,T0139.002,,,,,,,,,,,,,, +,T0139.003,,,,,,,,,,,,,, +,T0140,,,,,,,,,,,,,, +,T0140.001,,,,,,,,,,,,,, +,T0140.002,,,,,,,,,,,,,, +,T0140.003,,,,,,,,,,,,,, diff --git a/generated_pages/disarm_red_framework.md b/generated_pages/disarm_red_framework.md index 656ddf6..af9d7bc 100644 --- a/generated_pages/disarm_red_framework.md +++ b/generated_pages/disarm_red_framework.md @@ -57,7 +57,7 @@ T0048 Harass - +T0074.001 Geopolitical Advantage T0075 Dismiss T0101 Create Localised Content T0019.001 Create Fake Research @@ -65,7 +65,7 @@ T0042 Seed Kernel of Truth T0114.002 Traditional Media T0057 Organise Events -T0128 Conceal People +T0128 Conceal Information Assets T0132.002 Content Focused T0072.002 Demographic Segmentation T0022 Leverage Conspiracy Theory Narratives @@ -75,7 +75,7 @@ T0048.001 Boycott/"Cancel" Opponents - +T0074.002 Domestic Political Advantage T0075.001 Discredit Credible Sources T0102 Leverage Echo Chambers/Filter Bubbles T0019.002 Hijack Hashtags @@ -93,7 +93,7 @@ T0048.002 Harass People Based on Identities - +T0074.003 Economic Advantage T0076 Distort T0102.001 Use Existing Echo Chambers/Filter Bubbles T0023 Distort Facts @@ -111,7 +111,7 @@ T0048.003 Threaten to Dox - +T0074.004 Ideological Advantage T0077 Distract T0102.002 Create Echo Chambers/Filter Bubbles T0023.001 Reframe Context @@ -137,7 +137,7 @@ T0113 Employ Commercial Analytic Firms T0115.003 One-Way Direct Posting T0126 Encourage Attendance at Events -T0128.004 Launder Accounts +T0128.004 Launder Information Assets T0133.002 Content T0080 Map Target Audience Information Environment T0068 Respond to Breaking News Event or Active Crisis @@ -155,7 +155,7 @@ T0116 Comment or Reply on Content T0126.001 Call to Action to Attend -T0128.005 Change Names of Accounts +T0128.005 Change Names of Information Assets T0133.003 Awareness T0080.001 Monitor Social Media Analytics T0082 Develop New Narratives @@ -166,7 +166,7 @@ - +T0135 Undermine T0084.001 Use Copypasta T0104.001 Mainstream Social Networks @@ -184,7 +184,7 @@ - +T0135.001 Smear T0084.002 Plagiarise Content T0104.002 Dating Apps @@ -202,7 +202,7 @@ - +T0135.002 Thwart T0084.003 Deceptively Labelled or Translated T0104.003 Private/Closed Social Networks @@ -220,7 +220,7 @@ - +T0135.003 Subvert T0084.004 Appropriate Content T0104.004 Interest-Based Networks @@ -238,7 +238,7 @@ - +T0135.004 Polarise T0085 Develop Text-Based Content T0104.005 Use Hashtags @@ -256,7 +256,7 @@ - +T0136 Cultivate Support T0085.001 Develop AI-Generated Text T0104.006 Create Dedicated Hashtag @@ -274,7 +274,7 @@ - +T0136.001 Defend Reputaton T0085.002 Develop False or Altered Documents T0105 Media Sharing Networks @@ -292,7 +292,7 @@ - +T0136.002 Justify Action T0085.003 Develop Inauthentic News Articles T0105.001 Photo Sharing @@ -310,7 +310,7 @@ - +T0136.003 Energise Supporters T0086 Develop Image-Based Content T0105.002 Video Sharing @@ -328,7 +328,7 @@ - +T0136.004 Boost Reputation T0086.001 Develop Memes T0105.003 Audio Sharing @@ -346,7 +346,7 @@ - +T0136.005 Cultvate Support for Initiative T0086.002 Develop AI-Generated Images (Deepfakes) T0106 Discussion Forums @@ -364,7 +364,7 @@ - +T0136.006 Cultivate Support for Ally T0086.003 Deceptively Edit Images (Cheap Fakes) T0106.001 Anonymous Message Boards @@ -382,7 +382,7 @@ - +T0136.007 Recruit Members T0086.004 Aggregate Information into Evidence Collages T0107 Bookmarking and Content Curation @@ -400,7 +400,7 @@ - +T0136.008 Increase Prestige T0087 Develop Video-Based Content T0108 Blogging and Publishing Networks @@ -418,7 +418,7 @@ - +T0137 Make Money T0087.001 Develop AI-Generated Videos (Deepfakes) T0109 Consumer Review Networks @@ -436,7 +436,7 @@ - +T0137.001 Generate Ad Revenue T0087.002 Deceptively Edit Video (Cheap Fakes) T0110 Formal Diplomatic Channels @@ -454,7 +454,7 @@ - +T0137.002 Scam T0088 Develop Audio-Based Content T0111 Traditional Media @@ -472,7 +472,7 @@ - +T0137.003 Raise Funds T0088.001 Develop AI-Generated Audio (Deepfakes) T0111.001 TV @@ -490,7 +490,7 @@ - +T0137.004 Sell Items under False Pretences T0088.002 Deceptively Edit Audio (Cheap Fakes) T0111.002 Newspaper @@ -508,7 +508,7 @@ - +T0137.005 Extort T0089 Obtain Private Documents T0111.003 Radio @@ -526,7 +526,7 @@ - +T0137.006 Manipulate Stocks T0089.001 Obtain Authentic Documents T0112 Email @@ -544,7 +544,7 @@ - +T0138 Motivate to Act T0089.002 Create Inauthentic Documents @@ -562,7 +562,7 @@ - +T0138.001 Encourage T0089.003 Alter Authentic Documents @@ -579,5 +579,185 @@ + +T0138.002 Provoke + + + + + + + + + + + + + + + + + +T0138.003 Compel + + + + + + + + + + + + + + + + + +T0139 Dissuade from Acting + + + + + + + + + + + + + + + + + +T0139.001 Discourage + + + + + + + + + + + + + + + + + +T0139.002 Silence + + + + + + + + + + + + + + + + + +T0139.003 Deter + + + + + + + + + + + + + + + + + +T0140 Cause Harm + + + + + + + + + + + + + + + + + +T0140.001 Defame + + + + + + + + + + + + + + + + + +T0140.002 Intimidate + + + + + + + + + + + + + + + + + +T0140.003 Spread Hate + + + + + + + + + + + + + + + + diff --git a/generated_pages/tactics/TA01.md b/generated_pages/tactics/TA01.md index e7585c5..17a11f6 100644 --- a/generated_pages/tactics/TA01.md +++ b/generated_pages/tactics/TA01.md @@ -19,6 +19,10 @@ | ---------- | | [T0073 Determine Target Audiences](../../generated_pages/techniques/T0073.md) | | [T0074 Determine Strategic Ends](../../generated_pages/techniques/T0074.md) | +| [T0074.001 Geopolitical Advantage](../../generated_pages/techniques/T0074.001.md) | +| [T0074.002 Domestic Political Advantage](../../generated_pages/techniques/T0074.002.md) | +| [T0074.003 Economic Advantage](../../generated_pages/techniques/T0074.003.md) | +| [T0074.004 Ideological Advantage](../../generated_pages/techniques/T0074.004.md) | diff --git a/generated_pages/tactics/TA02.md b/generated_pages/tactics/TA02.md index 9c2db32..c843d04 100644 --- a/generated_pages/tactics/TA02.md +++ b/generated_pages/tactics/TA02.md @@ -1,6 +1,6 @@ # Tactic TA02: Plan Objectives -* **Summary:** Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: - Each desired effect should link directly to one or more objectives - The effect should be measurable - The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task. +* **Summary:** Set clearly defined, measurable, and achievable objectives. In some cases achieving objectives ties execution of tactical tasks to reaching the desired strategic end state. In other cases, where there is no clearly defined strategic end state, the tactical objective may stand on its own. The objective statement should not specify the way and means of accomplishment but rather the goal the threat actor wishes to achieve. * **Belongs to phase:** P01 @@ -28,6 +28,39 @@ | [T0077 Distract](../../generated_pages/techniques/T0077.md) | | [T0078 Dismay](../../generated_pages/techniques/T0078.md) | | [T0079 Divide](../../generated_pages/techniques/T0079.md) | +| [T0135 Undermine](../../generated_pages/techniques/T0135.md) | +| [T0135.001 Smear](../../generated_pages/techniques/T0135.001.md) | +| [T0135.002 Thwart](../../generated_pages/techniques/T0135.002.md) | +| [T0135.003 Subvert](../../generated_pages/techniques/T0135.003.md) | +| [T0135.004 Polarise](../../generated_pages/techniques/T0135.004.md) | +| [T0136 Cultivate Support](../../generated_pages/techniques/T0136.md) | +| [T0136.001 Defend Reputaton](../../generated_pages/techniques/T0136.001.md) | +| [T0136.002 Justify Action](../../generated_pages/techniques/T0136.002.md) | +| [T0136.003 Energise Supporters](../../generated_pages/techniques/T0136.003.md) | +| [T0136.004 Boost Reputation](../../generated_pages/techniques/T0136.004.md) | +| [T0136.005 Cultvate Support for Initiative](../../generated_pages/techniques/T0136.005.md) | +| [T0136.006 Cultivate Support for Ally](../../generated_pages/techniques/T0136.006.md) | +| [T0136.007 Recruit Members](../../generated_pages/techniques/T0136.007.md) | +| [T0136.008 Increase Prestige](../../generated_pages/techniques/T0136.008.md) | +| [T0137 Make Money](../../generated_pages/techniques/T0137.md) | +| [T0137.001 Generate Ad Revenue](../../generated_pages/techniques/T0137.001.md) | +| [T0137.002 Scam](../../generated_pages/techniques/T0137.002.md) | +| [T0137.003 Raise Funds](../../generated_pages/techniques/T0137.003.md) | +| [T0137.004 Sell Items under False Pretences](../../generated_pages/techniques/T0137.004.md) | +| [T0137.005 Extort](../../generated_pages/techniques/T0137.005.md) | +| [T0137.006 Manipulate Stocks](../../generated_pages/techniques/T0137.006.md) | +| [T0138 Motivate to Act](../../generated_pages/techniques/T0138.md) | +| [T0138.001 Encourage](../../generated_pages/techniques/T0138.001.md) | +| [T0138.002 Provoke](../../generated_pages/techniques/T0138.002.md) | +| [T0138.003 Compel](../../generated_pages/techniques/T0138.003.md) | +| [T0139 Dissuade from Acting](../../generated_pages/techniques/T0139.md) | +| [T0139.001 Discourage](../../generated_pages/techniques/T0139.001.md) | +| [T0139.002 Silence](../../generated_pages/techniques/T0139.002.md) | +| [T0139.003 Deter](../../generated_pages/techniques/T0139.003.md) | +| [T0140 Cause Harm](../../generated_pages/techniques/T0140.md) | +| [T0140.001 Defame](../../generated_pages/techniques/T0140.001.md) | +| [T0140.002 Intimidate](../../generated_pages/techniques/T0140.002.md) | +| [T0140.003 Spread Hate](../../generated_pages/techniques/T0140.003.md) | diff --git a/generated_pages/tactics/TA11.md b/generated_pages/tactics/TA11.md index e6aa785..9d2c1b1 100644 --- a/generated_pages/tactics/TA11.md +++ b/generated_pages/tactics/TA11.md @@ -21,12 +21,12 @@ | ---------- | | [T0059 Play the Long Game](../../generated_pages/techniques/T0059.md) | | [T0060 Continue to Amplify](../../generated_pages/techniques/T0060.md) | -| [T0128 Conceal People](../../generated_pages/techniques/T0128.md) | +| [T0128 Conceal Information Assets](../../generated_pages/techniques/T0128.md) | | [T0128.001 Use Pseudonyms](../../generated_pages/techniques/T0128.001.md) | | [T0128.002 Conceal Network Identity](../../generated_pages/techniques/T0128.002.md) | | [T0128.003 Distance Reputable Individuals from Operation](../../generated_pages/techniques/T0128.003.md) | -| [T0128.004 Launder Accounts](../../generated_pages/techniques/T0128.004.md) | -| [T0128.005 Change Names of Accounts](../../generated_pages/techniques/T0128.005.md) | +| [T0128.004 Launder Information Assets](../../generated_pages/techniques/T0128.004.md) | +| [T0128.005 Change Names of Information Assets](../../generated_pages/techniques/T0128.005.md) | | [T0129 Conceal Operational Activity](../../generated_pages/techniques/T0129.md) | | [T0129.001 Conceal Network Identity](../../generated_pages/techniques/T0129.001.md) | | [T0129.002 Generate Content Unrelated to Narrative](../../generated_pages/techniques/T0129.002.md) | diff --git a/generated_pages/tactics_index.md b/generated_pages/tactics_index.md index 3a81bdd..9782f47 100644 --- a/generated_pages/tactics_index.md +++ b/generated_pages/tactics_index.md @@ -16,7 +16,7 @@ TA02 Plan Objectives -Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: - Each desired effect should link directly to one or more objectives - The effect should be measurable - The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task. +Set clearly defined, measurable, and achievable objectives. In some cases achieving objectives ties execution of tactical tasks to reaching the desired strategic end state. In other cases, where there is no clearly defined strategic end state, the tactical objective may stand on its own. The objective statement should not specify the way and means of accomplishment but rather the goal the threat actor wishes to achieve. P01 diff --git a/generated_pages/techniques/T0074.001.md b/generated_pages/techniques/T0074.001.md new file mode 100644 index 0000000..09d6699 --- /dev/null +++ b/generated_pages/techniques/T0074.001.md @@ -0,0 +1,17 @@ +# Technique T0074.001: Geopolitical Advantage + +* **Summary**: Favourable position on the international stage in terms of great power politics or regional rivalry. Geopolitics plays out in the realms of foreign policy, national security, diplomacy, and intelligence. It involves nation-state governments, heads of state, foreign ministers, intergovernmental organisations, and regional security alliances. + +* **Belongs to tactic stage**: TA01 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0074.002.md b/generated_pages/techniques/T0074.002.md new file mode 100644 index 0000000..6022810 --- /dev/null +++ b/generated_pages/techniques/T0074.002.md @@ -0,0 +1,17 @@ +# Technique T0074.002: Domestic Political Advantage + +* **Summary**: Favourable position vis-à-vis national or sub-national political opponents such as political parties, interest groups, politicians, candidates. + +* **Belongs to tactic stage**: TA01 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0074.003.md b/generated_pages/techniques/T0074.003.md new file mode 100644 index 0000000..442e8a0 --- /dev/null +++ b/generated_pages/techniques/T0074.003.md @@ -0,0 +1,17 @@ +# Technique T0074.003: Economic Advantage + +* **Summary**: Favourable position domestically or internationally in the realms of commerce, trade, finance, industry. Economics involves nation-states, corporations, banks, trade blocs, industry associations, cartels. + +* **Belongs to tactic stage**: TA01 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0074.004.md b/generated_pages/techniques/T0074.004.md new file mode 100644 index 0000000..15fd8f9 --- /dev/null +++ b/generated_pages/techniques/T0074.004.md @@ -0,0 +1,17 @@ +# Technique T0074.004: Ideological Advantage + +* **Summary**: Favourable position domestically or internationally in the market for ideas, beliefs, and world views. Competition plays out among faith systems, political systems, and value systems. It can involve sub-national, national or supra-national movements. + +* **Belongs to tactic stage**: TA01 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0074.md b/generated_pages/techniques/T0074.md index 6790db4..9159aff 100644 --- a/generated_pages/techniques/T0074.md +++ b/generated_pages/techniques/T0074.md @@ -1,6 +1,6 @@ # Technique T0074: Determine Strategic Ends -* **Summary**: Determining the campaigns goals or objectives. Examples include achieving achieving geopolitical advantage like undermining trust in an adversary, gaining domestic political advantage, achieving financial gain, or attaining a policy change, +* **Summary**: These are the long-term end-states the campaign aims to bring about. They typically involve an advantageous position vis-a-vis competitors in terms of power or influence. The strategic goal may be to improve or simply to hold one’s position. Competition occurs in the public sphere in the domains of war, diplomacy, politics, economics, and ideology, and can play out between armed groups, nation-states, political parties, corporations, interest groups, or individuals. * **Belongs to tactic stage**: TA01 diff --git a/generated_pages/techniques/T0128.001.md b/generated_pages/techniques/T0128.001.md index 0fd2d34..3ab8c8b 100644 --- a/generated_pages/techniques/T0128.001.md +++ b/generated_pages/techniques/T0128.001.md @@ -1,6 +1,6 @@ # Technique T0128.001: Use Pseudonyms -* **Summary**: An operation may use pseudonyms, or fake names, to mask the identity of operation accounts, publish anonymous content, or otherwise use falsified personas to conceal identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account with the same falsified name. +* **Summary**: An operation may use pseudonyms, or fake names, to mask the identity of operational accounts, channels, pages etc., publish anonymous content, or otherwise use falsified personas to conceal the identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account, channel, or page with the same falsified name. * **Belongs to tactic stage**: TA11 diff --git a/generated_pages/techniques/T0128.004.md b/generated_pages/techniques/T0128.004.md index 68cac93..4e17006 100644 --- a/generated_pages/techniques/T0128.004.md +++ b/generated_pages/techniques/T0128.004.md @@ -1,6 +1,6 @@ -# Technique T0128.004: Launder Accounts +# Technique T0128.004: Launder Information Assets -* **Summary**: Account laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution. +* **Summary**: Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution. * **Belongs to tactic stage**: TA11 diff --git a/generated_pages/techniques/T0128.005.md b/generated_pages/techniques/T0128.005.md index 442b712..1644a18 100644 --- a/generated_pages/techniques/T0128.005.md +++ b/generated_pages/techniques/T0128.005.md @@ -1,6 +1,6 @@ -# Technique T0128.005: Change Names of Accounts +# Technique T0128.005: Change Names of Information Assets -* **Summary**: Changing names of accounts occurs when an operation changes the name of an existing social media account. An operation may change the names of its accounts throughout an operation to avoid detection or alter the names of newly acquired or repurposed accounts to fit operational narratives. +* **Summary**: Changing names or brand names of information assets such as accounts, channels, pages etc. An operation may change the names or brand names of its assets throughout an operation to avoid detection or alter the names of newly acquired or repurposed assets to fit operational narratives. * **Belongs to tactic stage**: TA11 diff --git a/generated_pages/techniques/T0128.md b/generated_pages/techniques/T0128.md index 7b33aa0..df1e067 100644 --- a/generated_pages/techniques/T0128.md +++ b/generated_pages/techniques/T0128.md @@ -1,6 +1,6 @@ -# Technique T0128: Conceal People +# Technique T0128: Conceal Information Assets -* **Summary**: Conceal the identity or provenance of a campaign account and people assets to avoid takedown and attribution. +* **Summary**: Conceal the identity or provenance of campaign information assets such as accounts, channels, pages etc. to avoid takedown and attribution. * **Belongs to tactic stage**: TA11 diff --git a/generated_pages/techniques/T0135.001.md b/generated_pages/techniques/T0135.001.md new file mode 100644 index 0000000..6d5577d --- /dev/null +++ b/generated_pages/techniques/T0135.001.md @@ -0,0 +1,17 @@ +# Technique T0135.001: Smear + +* **Summary**: Denigrate, disparage, or discredit an opponent. This is a common tactical objective in political campaigns with a larger strategic goal. It differs from efforts to harm a target through defamation. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0135.002.md b/generated_pages/techniques/T0135.002.md new file mode 100644 index 0000000..2c6420d --- /dev/null +++ b/generated_pages/techniques/T0135.002.md @@ -0,0 +1,17 @@ +# Technique T0135.002: Thwart + +* **Summary**: Prevent the successful outcome of a policy, operation, or initiative. Actors conduct influence operations to stymie or foil proposals, plans, or courses of action which are not in their interest. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0135.003.md b/generated_pages/techniques/T0135.003.md new file mode 100644 index 0000000..e74cc1c --- /dev/null +++ b/generated_pages/techniques/T0135.003.md @@ -0,0 +1,17 @@ +# Technique T0135.003: Subvert + +* **Summary**: Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of “active measures” involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0135.004.md b/generated_pages/techniques/T0135.004.md new file mode 100644 index 0000000..cf53c74 --- /dev/null +++ b/generated_pages/techniques/T0135.004.md @@ -0,0 +1,17 @@ +# Technique T0135.004: Polarise + +* **Summary**: To cause a target audience to divide into two completely opposing groups. This is a special case of subversion. To divide and conquer is an age-old approach to subverting and overcoming an enemy. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0135.md b/generated_pages/techniques/T0135.md new file mode 100644 index 0000000..108770c --- /dev/null +++ b/generated_pages/techniques/T0135.md @@ -0,0 +1,17 @@ +# Technique T0135: Undermine + +* **Summary**: Weaken, debilitate, or subvert a target or their actions. An influence operation may be designed to disparage an opponent; sabotage an opponent’s systems or processes; compromise an opponent’s relationships or support system; impair an opponent’s capability; or thwart an opponent’s initiative. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.001.md b/generated_pages/techniques/T0136.001.md new file mode 100644 index 0000000..601ac34 --- /dev/null +++ b/generated_pages/techniques/T0136.001.md @@ -0,0 +1,17 @@ +# Technique T0136.001: Defend Reputaton + +* **Summary**: Preserve a positive perception in the public’s mind following an accusation or adverse event. When accused of a wrongful act, an actor may engage in denial, counter accusations, whataboutism, or conspiracy theories to distract public attention and attempt to maintain a positive image. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.002.md b/generated_pages/techniques/T0136.002.md new file mode 100644 index 0000000..d3df472 --- /dev/null +++ b/generated_pages/techniques/T0136.002.md @@ -0,0 +1,17 @@ +# Technique T0136.002: Justify Action + +* **Summary**: To convince others to exonerate you of a perceived wrongdoing. When an actor finds it untenable to deny doing something, they may attempt to exonerate themselves with disinformation which claims the action was reasonable. This is a special case of “Defend Reputation”. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.003.md b/generated_pages/techniques/T0136.003.md new file mode 100644 index 0000000..92b6429 --- /dev/null +++ b/generated_pages/techniques/T0136.003.md @@ -0,0 +1,17 @@ +# Technique T0136.003: Energise Supporters + +* **Summary**: Raise the morale of those who support the organisation or group. Invigorate constituents with zeal for the mission or activity. Terrorist groups, political movements, and cults may indoctrinate their supporters with ideologies that are based on warped versions of religion or cause harm to others. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.004.md b/generated_pages/techniques/T0136.004.md new file mode 100644 index 0000000..4ea0ac1 --- /dev/null +++ b/generated_pages/techniques/T0136.004.md @@ -0,0 +1,17 @@ +# Technique T0136.004: Boost Reputation + +* **Summary**: Elevate the estimation of the actor in the public’s mind. Improve their image or standing. Public relations professionals use persuasive overt communications to achieve this goal; manipulators use covert disinformation. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.005.md b/generated_pages/techniques/T0136.005.md new file mode 100644 index 0000000..5fd7fa9 --- /dev/null +++ b/generated_pages/techniques/T0136.005.md @@ -0,0 +1,17 @@ +# Technique T0136.005: Cultvate Support for Initiative + +* **Summary**: Elevate or fortify the public backing for a policy, operation, or idea. Domestic and foreign actors can use artificial means to fabricate or amplify public support for a proposal or action. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.006.md b/generated_pages/techniques/T0136.006.md new file mode 100644 index 0000000..ef425ca --- /dev/null +++ b/generated_pages/techniques/T0136.006.md @@ -0,0 +1,17 @@ +# Technique T0136.006: Cultivate Support for Ally + +* **Summary**: Elevate or fortify the public backing for a partner. Governments may interfere in other countries’ elections by covertly favouring a party or candidate aligned with their interests. They may also mount an influence operation to bolster the reputation of an ally under attack. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.007.md b/generated_pages/techniques/T0136.007.md new file mode 100644 index 0000000..68588e7 --- /dev/null +++ b/generated_pages/techniques/T0136.007.md @@ -0,0 +1,17 @@ +# Technique T0136.007: Recruit Members + +* **Summary**: Motivate followers to join or subscribe as members of the team. Organisations may mount recruitment drives that use propaganda to entice sympathisers to sign up. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.008.md b/generated_pages/techniques/T0136.008.md new file mode 100644 index 0000000..fdc2fbb --- /dev/null +++ b/generated_pages/techniques/T0136.008.md @@ -0,0 +1,17 @@ +# Technique T0136.008: Increase Prestige + +* **Summary**: Improve personal standing within a community. Gain fame, approbation, or notoriety. Conspiracy theorists, those with special access, and ideologues can gain prominence in a community by propagating disinformation, leaking confidential documents, or spreading hate. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0136.md b/generated_pages/techniques/T0136.md new file mode 100644 index 0000000..6d3cca2 --- /dev/null +++ b/generated_pages/techniques/T0136.md @@ -0,0 +1,17 @@ +# Technique T0136: Cultivate Support + +* **Summary**: Grow or maintain the base of support for the actor, ally, or action. This includes hard core recruitment, managing alliances, and generating or maintaining sympathy among a wider audience, including reputation management and public relations. Sub-techniques assume support for actor (self) unless otherwise specified. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0137.001.md b/generated_pages/techniques/T0137.001.md new file mode 100644 index 0000000..933a5ed --- /dev/null +++ b/generated_pages/techniques/T0137.001.md @@ -0,0 +1,17 @@ +# Technique T0137.001: Generate Ad Revenue + +* **Summary**: Earn income from digital advertisements published alongside inauthentic content. Conspiratorial, false, or provocative content drives internet traffic. Content owners earn money from impressions of, or clicks on, or conversions of ads published on their websites, social media profiles, or streaming services, or ads published when their content appears in search engine results. Fraudsters simulate impressions, clicks, and conversions, or they spin up inauthentic sites or social media profiles just to generate ad revenue. Conspiracy theorists and political operators generate ad revenue as a byproduct of their operation or as a means of sustaining their campaign. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0137.002.md b/generated_pages/techniques/T0137.002.md new file mode 100644 index 0000000..ebaf5d5 --- /dev/null +++ b/generated_pages/techniques/T0137.002.md @@ -0,0 +1,17 @@ +# Technique T0137.002: Scam + +* **Summary**: Defraud a target or trick a target into doing something that benefits the attacker. A typical scam is where a fraudster convinces a target to pay for something without the intention of ever delivering anything in return. Alternatively, the fraudster may promise benefits which never materialise, such as a fake cure. Criminals often exploit a fear or crisis or generate a sense of urgency. They may use deepfakes to impersonate authority figures or individuals in distress. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0137.003.md b/generated_pages/techniques/T0137.003.md new file mode 100644 index 0000000..36be7aa --- /dev/null +++ b/generated_pages/techniques/T0137.003.md @@ -0,0 +1,17 @@ +# Technique T0137.003: Raise Funds + +* **Summary**: Solicit donations for a cause. Popular conspiracy theorists can attract financial contributions from their followers. Fighting back against the establishment is a popular crowdfunding narrative. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0137.004.md b/generated_pages/techniques/T0137.004.md new file mode 100644 index 0000000..756cee6 --- /dev/null +++ b/generated_pages/techniques/T0137.004.md @@ -0,0 +1,17 @@ +# Technique T0137.004: Sell Items under False Pretences + +* **Summary**: Offer products for sale under false pretences. Campaigns may hijack or create causes built on disinformation to sell promotional merchandise. Or charlatans may amplify victims’ unfounded fears to sell them items of questionable utility such as supplements or survival gear. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0137.005.md b/generated_pages/techniques/T0137.005.md new file mode 100644 index 0000000..bdd88f2 --- /dev/null +++ b/generated_pages/techniques/T0137.005.md @@ -0,0 +1,17 @@ +# Technique T0137.005: Extort + +* **Summary**: Coerce money or favours from a target by threatening to expose or corrupt information. Ransomware criminals typically demand money. Intelligence agencies demand national secrets. Sexual predators demand favours. The leverage may be critical, sensitive, or embarrassing information. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0137.006.md b/generated_pages/techniques/T0137.006.md new file mode 100644 index 0000000..6916f11 --- /dev/null +++ b/generated_pages/techniques/T0137.006.md @@ -0,0 +1,17 @@ +# Technique T0137.006: Manipulate Stocks + +* **Summary**: Artificially inflate or deflate the price of stocks or other financial instruments and then trade on these to make profit. The most common securities fraud schemes are called “pump and dump” and “poop and scoop”. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0137.md b/generated_pages/techniques/T0137.md new file mode 100644 index 0000000..b15cc10 --- /dev/null +++ b/generated_pages/techniques/T0137.md @@ -0,0 +1,17 @@ +# Technique T0137: Make Money + +* **Summary**: Profit from disinformation, conspiracy theories, or online harm. In some cases, the sole objective is financial gain, in other cases the objective is both financial and political. Making money may also be a way to sustain a political campaign. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0138.001.md b/generated_pages/techniques/T0138.001.md new file mode 100644 index 0000000..3792afc --- /dev/null +++ b/generated_pages/techniques/T0138.001.md @@ -0,0 +1,17 @@ +# Technique T0138.001: Encourage + +* **Summary**: Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0138.002.md b/generated_pages/techniques/T0138.002.md new file mode 100644 index 0000000..1e3f412 --- /dev/null +++ b/generated_pages/techniques/T0138.002.md @@ -0,0 +1,17 @@ +# Technique T0138.002: Provoke + +* **Summary**: Instigate, incite, or arouse a target to act. Social media manipulators exploit moral outrage to propel targets to spread hate, take to the streets to protest, or engage in acts of violence. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0138.003.md b/generated_pages/techniques/T0138.003.md new file mode 100644 index 0000000..968e512 --- /dev/null +++ b/generated_pages/techniques/T0138.003.md @@ -0,0 +1,17 @@ +# Technique T0138.003: Compel + +* **Summary**: Force target to take an action or to stop taking an action it has already started. Actors can use the threat of reputational damage alongside military or economic threats to compel a target. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0138.md b/generated_pages/techniques/T0138.md new file mode 100644 index 0000000..f5c8d06 --- /dev/null +++ b/generated_pages/techniques/T0138.md @@ -0,0 +1,17 @@ +# Technique T0138: Motivate to Act + +* **Summary**: Persuade, impel, or provoke the target to behave in a specific manner favourable to the attacker. Some common behaviours are joining, subscribing, voting, buying, demonstrating, fighting, retreating, resigning, boycotting. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0139.001.md b/generated_pages/techniques/T0139.001.md new file mode 100644 index 0000000..5faeec0 --- /dev/null +++ b/generated_pages/techniques/T0139.001.md @@ -0,0 +1,17 @@ +# Technique T0139.001: Discourage + +* **Summary**: Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0139.002.md b/generated_pages/techniques/T0139.002.md new file mode 100644 index 0000000..adf4b24 --- /dev/null +++ b/generated_pages/techniques/T0139.002.md @@ -0,0 +1,17 @@ +# Technique T0139.002: Silence + +* **Summary**: Intimidate or incentivise target into remaining silent or prevent target from speaking out. A threat actor may cow a target into silence as a special case of deterrence. Or they may buy the target’s silence. Or they may repress or restrict the target’s speech. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0139.003.md b/generated_pages/techniques/T0139.003.md new file mode 100644 index 0000000..4bb722f --- /dev/null +++ b/generated_pages/techniques/T0139.003.md @@ -0,0 +1,17 @@ +# Technique T0139.003: Deter + +* **Summary**: Prevent target from taking an action for fear of the consequences. Deterrence occurs in the mind of the target, who fears they will be worse off if they take an action than if they don’t. When making threats, aggressors may bluff, feign irrationality, or engage in brinksmanship. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0139.md b/generated_pages/techniques/T0139.md new file mode 100644 index 0000000..166bab3 --- /dev/null +++ b/generated_pages/techniques/T0139.md @@ -0,0 +1,17 @@ +# Technique T0139: Dissuade from Acting + +* **Summary**: Discourage, deter, or inhibit the target from actions which would be unfavourable to the attacker. The actor may want the target to refrain from voting, buying, fighting, or supplying. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0140.001.md b/generated_pages/techniques/T0140.001.md new file mode 100644 index 0000000..ad884dd --- /dev/null +++ b/generated_pages/techniques/T0140.001.md @@ -0,0 +1,17 @@ +# Technique T0140.001: Defame + +* **Summary**: Attempt to damage the target’s personal reputation by impugning their character. This can range from subtle attempts to misrepresent or insinuate, to obvious attempts to denigrate or disparage, to blatant attempts to malign or vilify. Slander applies to oral expression. Libel applies to written or pictorial material. Defamation is often carried out by online trolls. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0140.002.md b/generated_pages/techniques/T0140.002.md new file mode 100644 index 0000000..8773a37 --- /dev/null +++ b/generated_pages/techniques/T0140.002.md @@ -0,0 +1,17 @@ +# Technique T0140.002: Intimidate + +* **Summary**: Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0140.003.md b/generated_pages/techniques/T0140.003.md new file mode 100644 index 0000000..9a9dec9 --- /dev/null +++ b/generated_pages/techniques/T0140.003.md @@ -0,0 +1,17 @@ +# Technique T0140.003: Spread Hate + +* **Summary**: Publish and/or propagate demeaning, derisive, or humiliating content targeting an individual or group of individuals with the intent to cause emotional, psychological, or physical distress. Hate speech can cause harm directly or incite others to harm the target. It often aims to stigmatise the target by singling out immutable characteristics such as colour, race, religion, national or ethnic origin, gender, gender identity, sexual orientation, age, disease, or mental or physical disability. Thus, promoting hatred online may involve racism, antisemitism, Islamophobia, xenophobia, sexism, misogyny, homophobia, transphobia, ageism, ableism, or any combination thereof. Motivations for hate speech range from group preservation to ideological superiority to the unbridled infliction of suffering. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0140.md b/generated_pages/techniques/T0140.md new file mode 100644 index 0000000..476a6b9 --- /dev/null +++ b/generated_pages/techniques/T0140.md @@ -0,0 +1,17 @@ +# Technique T0140: Cause Harm + +* **Summary**: Persecute, malign, or inflict pain upon a target. The objective of a campaign may be to cause fear or emotional distress in a target. In some cases, harm is instrumental to achieving a primary objective, as in coercion, repression, or intimidation. In other cases, harm may be inflicted for the satisfaction of the perpetrator, as in revenge or sadistic cruelty. + +* **Belongs to tactic stage**: TA02 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques_index.md b/generated_pages/techniques_index.md index 331bf13..04c70f5 100644 --- a/generated_pages/techniques_index.md +++ b/generated_pages/techniques_index.md @@ -412,7 +412,31 @@ T0074 Determine Strategic Ends -Determining the campaigns goals or objectives. Examples include achieving achieving geopolitical advantage like undermining trust in an adversary, gaining domestic political advantage, achieving financial gain, or attaining a policy change, +These are the long-term end-states the campaign aims to bring about. They typically involve an advantageous position vis-a-vis competitors in terms of power or influence. The strategic goal may be to improve or simply to hold one’s position. Competition occurs in the public sphere in the domains of war, diplomacy, politics, economics, and ideology, and can play out between armed groups, nation-states, political parties, corporations, interest groups, or individuals. +TA01 + + +T0074.001 +Geopolitical Advantage +Favourable position on the international stage in terms of great power politics or regional rivalry. Geopolitics plays out in the realms of foreign policy, national security, diplomacy, and intelligence. It involves nation-state governments, heads of state, foreign ministers, intergovernmental organisations, and regional security alliances. +TA01 + + +T0074.002 +Domestic Political Advantage +Favourable position vis-à-vis national or sub-national political opponents such as political parties, interest groups, politicians, candidates. +TA01 + + +T0074.003 +Economic Advantage +Favourable position domestically or internationally in the realms of commerce, trade, finance, industry. Economics involves nation-states, corporations, banks, trade blocs, industry associations, cartels. +TA01 + + +T0074.004 +Ideological Advantage +Favourable position domestically or internationally in the market for ideas, beliefs, and world views. Competition plays out among faith systems, political systems, and value systems. It can involve sub-national, national or supra-national movements. TA01 @@ -1317,14 +1341,14 @@ T0128 -Conceal People -Conceal the identity or provenance of a campaign account and people assets to avoid takedown and attribution. +Conceal Information Assets +Conceal the identity or provenance of campaign information assets such as accounts, channels, pages etc. to avoid takedown and attribution. TA11 T0128.001 Use Pseudonyms -An operation may use pseudonyms, or fake names, to mask the identity of operation accounts, publish anonymous content, or otherwise use falsified personas to conceal identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account with the same falsified name. +An operation may use pseudonyms, or fake names, to mask the identity of operational accounts, channels, pages etc., publish anonymous content, or otherwise use falsified personas to conceal the identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account, channel, or page with the same falsified name. TA11 @@ -1341,14 +1365,14 @@ T0128.004 -Launder Accounts -Account laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution. +Launder Information Assets +Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution. TA11 T0128.005 -Change Names of Accounts -Changing names of accounts occurs when an operation changes the name of an existing social media account. An operation may change the names of its accounts throughout an operation to avoid detection or alter the names of newly acquired or repurposed accounts to fit operational narratives. +Change Names of Information Assets +Changing names or brand names of information assets such as accounts, channels, pages etc. An operation may change the names or brand names of its assets throughout an operation to avoid detection or alter the names of newly acquired or repurposed assets to fit operational narratives. TA11 @@ -1549,4 +1573,202 @@ Monitor and evaluate social media engagement in misinformation incidents. TA12 + +T0135 +Undermine +Weaken, debilitate, or subvert a target or their actions. An influence operation may be designed to disparage an opponent; sabotage an opponent’s systems or processes; compromise an opponent’s relationships or support system; impair an opponent’s capability; or thwart an opponent’s initiative. +TA02 + + +T0135.001 +Smear +Denigrate, disparage, or discredit an opponent. This is a common tactical objective in political campaigns with a larger strategic goal. It differs from efforts to harm a target through defamation. +TA02 + + +T0135.002 +Thwart +Prevent the successful outcome of a policy, operation, or initiative. Actors conduct influence operations to stymie or foil proposals, plans, or courses of action which are not in their interest. +TA02 + + +T0135.003 +Subvert +Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of “active measures” involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation. +TA02 + + +T0135.004 +Polarise +To cause a target audience to divide into two completely opposing groups. This is a special case of subversion. To divide and conquer is an age-old approach to subverting and overcoming an enemy. +TA02 + + +T0136 +Cultivate Support +Grow or maintain the base of support for the actor, ally, or action. This includes hard core recruitment, managing alliances, and generating or maintaining sympathy among a wider audience, including reputation management and public relations. Sub-techniques assume support for actor (self) unless otherwise specified. +TA02 + + +T0136.001 +Defend Reputaton +Preserve a positive perception in the public’s mind following an accusation or adverse event. When accused of a wrongful act, an actor may engage in denial, counter accusations, whataboutism, or conspiracy theories to distract public attention and attempt to maintain a positive image. +TA02 + + +T0136.002 +Justify Action +To convince others to exonerate you of a perceived wrongdoing. When an actor finds it untenable to deny doing something, they may attempt to exonerate themselves with disinformation which claims the action was reasonable. This is a special case of “Defend Reputation”. +TA02 + + +T0136.003 +Energise Supporters +Raise the morale of those who support the organisation or group. Invigorate constituents with zeal for the mission or activity. Terrorist groups, political movements, and cults may indoctrinate their supporters with ideologies that are based on warped versions of religion or cause harm to others. +TA02 + + +T0136.004 +Boost Reputation +Elevate the estimation of the actor in the public’s mind. Improve their image or standing. Public relations professionals use persuasive overt communications to achieve this goal; manipulators use covert disinformation. +TA02 + + +T0136.005 +Cultvate Support for Initiative +Elevate or fortify the public backing for a policy, operation, or idea. Domestic and foreign actors can use artificial means to fabricate or amplify public support for a proposal or action. +TA02 + + +T0136.006 +Cultivate Support for Ally +Elevate or fortify the public backing for a partner. Governments may interfere in other countries’ elections by covertly favouring a party or candidate aligned with their interests. They may also mount an influence operation to bolster the reputation of an ally under attack. +TA02 + + +T0136.007 +Recruit Members +Motivate followers to join or subscribe as members of the team. Organisations may mount recruitment drives that use propaganda to entice sympathisers to sign up. +TA02 + + +T0136.008 +Increase Prestige +Improve personal standing within a community. Gain fame, approbation, or notoriety. Conspiracy theorists, those with special access, and ideologues can gain prominence in a community by propagating disinformation, leaking confidential documents, or spreading hate. +TA02 + + +T0137 +Make Money +Profit from disinformation, conspiracy theories, or online harm. In some cases, the sole objective is financial gain, in other cases the objective is both financial and political. Making money may also be a way to sustain a political campaign. +TA02 + + +T0137.001 +Generate Ad Revenue +Earn income from digital advertisements published alongside inauthentic content. Conspiratorial, false, or provocative content drives internet traffic. Content owners earn money from impressions of, or clicks on, or conversions of ads published on their websites, social media profiles, or streaming services, or ads published when their content appears in search engine results. Fraudsters simulate impressions, clicks, and conversions, or they spin up inauthentic sites or social media profiles just to generate ad revenue. Conspiracy theorists and political operators generate ad revenue as a byproduct of their operation or as a means of sustaining their campaign. +TA02 + + +T0137.002 +Scam +Defraud a target or trick a target into doing something that benefits the attacker. A typical scam is where a fraudster convinces a target to pay for something without the intention of ever delivering anything in return. Alternatively, the fraudster may promise benefits which never materialise, such as a fake cure. Criminals often exploit a fear or crisis or generate a sense of urgency. They may use deepfakes to impersonate authority figures or individuals in distress. +TA02 + + +T0137.003 +Raise Funds +Solicit donations for a cause. Popular conspiracy theorists can attract financial contributions from their followers. Fighting back against the establishment is a popular crowdfunding narrative. +TA02 + + +T0137.004 +Sell Items under False Pretences +Offer products for sale under false pretences. Campaigns may hijack or create causes built on disinformation to sell promotional merchandise. Or charlatans may amplify victims’ unfounded fears to sell them items of questionable utility such as supplements or survival gear. +TA02 + + +T0137.005 +Extort +Coerce money or favours from a target by threatening to expose or corrupt information. Ransomware criminals typically demand money. Intelligence agencies demand national secrets. Sexual predators demand favours. The leverage may be critical, sensitive, or embarrassing information. +TA02 + + +T0137.006 +Manipulate Stocks +Artificially inflate or deflate the price of stocks or other financial instruments and then trade on these to make profit. The most common securities fraud schemes are called “pump and dump” and “poop and scoop”. +TA02 + + +T0138 +Motivate to Act +Persuade, impel, or provoke the target to behave in a specific manner favourable to the attacker. Some common behaviours are joining, subscribing, voting, buying, demonstrating, fighting, retreating, resigning, boycotting. +TA02 + + +T0138.001 +Encourage +Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. +TA02 + + +T0138.002 +Provoke +Instigate, incite, or arouse a target to act. Social media manipulators exploit moral outrage to propel targets to spread hate, take to the streets to protest, or engage in acts of violence. +TA02 + + +T0138.003 +Compel +Force target to take an action or to stop taking an action it has already started. Actors can use the threat of reputational damage alongside military or economic threats to compel a target. +TA02 + + +T0139 +Dissuade from Acting +Discourage, deter, or inhibit the target from actions which would be unfavourable to the attacker. The actor may want the target to refrain from voting, buying, fighting, or supplying. +TA02 + + +T0139.001 +Discourage +Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. +TA02 + + +T0139.002 +Silence +Intimidate or incentivise target into remaining silent or prevent target from speaking out. A threat actor may cow a target into silence as a special case of deterrence. Or they may buy the target’s silence. Or they may repress or restrict the target’s speech. +TA02 + + +T0139.003 +Deter +Prevent target from taking an action for fear of the consequences. Deterrence occurs in the mind of the target, who fears they will be worse off if they take an action than if they don’t. When making threats, aggressors may bluff, feign irrationality, or engage in brinksmanship. +TA02 + + +T0140 +Cause Harm +Persecute, malign, or inflict pain upon a target. The objective of a campaign may be to cause fear or emotional distress in a target. In some cases, harm is instrumental to achieving a primary objective, as in coercion, repression, or intimidation. In other cases, harm may be inflicted for the satisfaction of the perpetrator, as in revenge or sadistic cruelty. +TA02 + + +T0140.001 +Defame +Attempt to damage the target’s personal reputation by impugning their character. This can range from subtle attempts to misrepresent or insinuate, to obvious attempts to denigrate or disparage, to blatant attempts to malign or vilify. Slander applies to oral expression. Libel applies to written or pictorial material. Defamation is often carried out by online trolls. +TA02 + + +T0140.002 +Intimidate +Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. +TA02 + + +T0140.003 +Spread Hate +Publish and/or propagate demeaning, derisive, or humiliating content targeting an individual or group of individuals with the intent to cause emotional, psychological, or physical distress. Hate speech can cause harm directly or incite others to harm the target. It often aims to stigmatise the target by singling out immutable characteristics such as colour, race, religion, national or ethnic origin, gender, gender identity, sexual orientation, age, disease, or mental or physical disability. Thus, promoting hatred online may involve racism, antisemitism, Islamophobia, xenophobia, sexism, misogyny, homophobia, transphobia, ageism, ableism, or any combination thereof. Motivations for hate speech range from group preservation to ideological superiority to the unbridled infliction of suffering. +TA02 +