Merge pull request #27 from DISARMFoundation/march24update

New Version 1.4 of Red Framework: Some of the Requests from EEAS and VIGINUM
This commit is contained in:
adam-disarm 2024-03-14 10:52:29 +00:00 committed by GitHub
commit 69453da88d
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
72 changed files with 894 additions and 384 deletions

View File

@ -54,7 +54,7 @@ function handleTechniqueClick(box) {
<td>TA12 Assess Effectiveness</td>
<td>TA13 Target Audience Analysis</td>
<td>TA14 Develop Narratives</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>TA16 Establish Legitimacy</td>
<td>TA17 Maximise Exposure</td>
<td>TA18 Drive Online Harms</td>

View File

@ -54,7 +54,7 @@ function handleTechniqueClick(box) {
<td>TA12 Assess Effectiveness</td>
<td>TA13 Target Audience Analysis</td>
<td>TA14 Develop Narratives</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>TA16 Establish Legitimacy</td>
<td>TA17 Maximise Exposure</td>
<td>TA18 Drive Online Harms</td>
@ -74,16 +74,16 @@ function handleTechniqueClick(box) {
<td id="T0003">T0003 Leverage Existing Narratives<input type="checkbox" id="T0003check" onclick="handleTechniqueClick('T0003')"></td>
<td id="T0007">T0007 Create Inauthentic Social Media Pages and Groups<input type="checkbox" id="T0007check" onclick="handleTechniqueClick('T0007')"></td>
<td id="T0009">T0009 Create Fake Experts<input type="checkbox" id="T0009check" onclick="handleTechniqueClick('T0009')"></td>
<td id="T0049">T0049 Flooding the Information Space<input type="checkbox" id="T0049check" onclick="handleTechniqueClick('T0049')"></td>
<td id="T0039">T0039 Bait Influencer<input type="checkbox" id="T0039check" onclick="handleTechniqueClick('T0039')"></td>
<td id="T0047">T0047 Censor Social Media as a Political Force<input type="checkbox" id="T0047check" onclick="handleTechniqueClick('T0047')"></td>
</tr>
<tr>
<td id="T0074">T0074 Determine Strategic Ends<input type="checkbox" id="T0074check" onclick="handleTechniqueClick('T0074')"></td>
<td id="T0066">T0066 Degrade Adversary<input type="checkbox" id="T0066check" onclick="handleTechniqueClick('T0066')"></td>
<td id="T0018">T0018 Purchase Targeted Advertisements<input type="checkbox" id="T0018check" onclick="handleTechniqueClick('T0018')"></td>
<td id="T0019">T0019 Generate Information Pollution<input type="checkbox" id="T0019check" onclick="handleTechniqueClick('T0019')"></td>
<td id="T0023">T0023 Distort Facts<input type="checkbox" id="T0023check" onclick="handleTechniqueClick('T0023')"></td>
<td id="T0043">T0043 Chat Apps<input type="checkbox" id="T0043check" onclick="handleTechniqueClick('T0043')"></td>
<td id="T0039">T0039 Bait Legitimate Influencers<input type="checkbox" id="T0039check" onclick="handleTechniqueClick('T0039')"></td>
<td id="T0042">T0042 Seed Kernel of Truth<input type="checkbox" id="T0042check" onclick="handleTechniqueClick('T0042')"></td>
<td id="T0114.001">T0114.001 Social Media<input type="checkbox" id="T0114.001check" onclick="handleTechniqueClick('T0114.001')"></td>
<td id="T0017.001">T0017.001 Conduct Crowdfunding Campaigns<input type="checkbox" id="T0017.001check" onclick="handleTechniqueClick('T0017.001')"></td>
<td id="T0060">T0060 Continue to Amplify<input type="checkbox" id="T0060check" onclick="handleTechniqueClick('T0060')"></td>
@ -92,16 +92,16 @@ function handleTechniqueClick(box) {
<td id="T0004">T0004 Develop Competing Narratives<input type="checkbox" id="T0004check" onclick="handleTechniqueClick('T0004')"></td>
<td id="T0010">T0010 Cultivate Ignorant Agents<input type="checkbox" id="T0010check" onclick="handleTechniqueClick('T0010')"></td>
<td id="T0009.001">T0009.001 Utilise Academic/Pseudoscientific Justifications<input type="checkbox" id="T0009.001check" onclick="handleTechniqueClick('T0009.001')"></td>
<td id="T0049.001">T0049.001 Trolls Amplify and Manipulate<input type="checkbox" id="T0049.001check" onclick="handleTechniqueClick('T0049.001')"></td>
<td id="T0049">T0049 Flood Information Space<input type="checkbox" id="T0049check" onclick="handleTechniqueClick('T0049')"></td>
<td id="T0048">T0048 Harass<input type="checkbox" id="T0048check" onclick="handleTechniqueClick('T0048')"></td>
</tr>
<tr>
<td id="T0074.001">T0074.001 Geopolitical Advantage<input type="checkbox" id="T0074.001check" onclick="handleTechniqueClick('T0074.001')"></td>
<td id="T0075">T0075 Dismiss<input type="checkbox" id="T0075check" onclick="handleTechniqueClick('T0075')"></td>
<td id="T0101">T0101 Create Localised Content<input type="checkbox" id="T0101check" onclick="handleTechniqueClick('T0101')"></td>
<td id="T0019.001">T0019.001 Create Fake Research<input type="checkbox" id="T0019.001check" onclick="handleTechniqueClick('T0019.001')"></td>
<td id="T0023.001">T0023.001 Reframe Context<input type="checkbox" id="T0023.001check" onclick="handleTechniqueClick('T0023.001')"></td>
<td id="T0043.001">T0043.001 Use Encrypted Chat Apps<input type="checkbox" id="T0043.001check" onclick="handleTechniqueClick('T0043.001')"></td>
<td id="T0042">T0042 Seed Kernel of Truth<input type="checkbox" id="T0042check" onclick="handleTechniqueClick('T0042')"></td>
<td id="T0044">T0044 Seed Distortions<input type="checkbox" id="T0044check" onclick="handleTechniqueClick('T0044')"></td>
<td id="T0114.002">T0114.002 Traditional Media<input type="checkbox" id="T0114.002check" onclick="handleTechniqueClick('T0114.002')"></td>
<td id="T0057">T0057 Organise Events<input type="checkbox" id="T0057check" onclick="handleTechniqueClick('T0057')"></td>
<td id="T0128">T0128 Conceal Information Assets<input type="checkbox" id="T0128check" onclick="handleTechniqueClick('T0128')"></td>
@ -109,17 +109,17 @@ function handleTechniqueClick(box) {
<td id="T0072.002">T0072.002 Demographic Segmentation<input type="checkbox" id="T0072.002check" onclick="handleTechniqueClick('T0072.002')"></td>
<td id="T0022">T0022 Leverage Conspiracy Theory Narratives<input type="checkbox" id="T0022check" onclick="handleTechniqueClick('T0022')"></td>
<td id="T0013">T0013 Create Inauthentic Websites<input type="checkbox" id="T0013check" onclick="handleTechniqueClick('T0013')"></td>
<td id="T0011">T0011 Compromise Legitimate Accounts<input type="checkbox" id="T0011check" onclick="handleTechniqueClick('T0011')"></td>
<td id="T0049.002">T0049.002 Hijack Existing Hashtag<input type="checkbox" id="T0049.002check" onclick="handleTechniqueClick('T0049.002')"></td>
<td id="T0097">T0097 Create Personas<input type="checkbox" id="T0097check" onclick="handleTechniqueClick('T0097')"></td>
<td id="T0049.001">T0049.001 Trolls Amplify and Manipulate<input type="checkbox" id="T0049.001check" onclick="handleTechniqueClick('T0049.001')"></td>
<td id="T0048.001">T0048.001 Boycott/"Cancel" Opponents<input type="checkbox" id="T0048.001check" onclick="handleTechniqueClick('T0048.001')"></td>
</tr>
<tr>
<td id="T0074.002">T0074.002 Domestic Political Advantage<input type="checkbox" id="T0074.002check" onclick="handleTechniqueClick('T0074.002')"></td>
<td id="T0075.001">T0075.001 Discredit Credible Sources<input type="checkbox" id="T0075.001check" onclick="handleTechniqueClick('T0075.001')"></td>
<td id="T0102">T0102 Leverage Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102check" onclick="handleTechniqueClick('T0102')"></td>
<td id="T0019.002">T0019.002 Hijack Hashtags<input type="checkbox" id="T0019.002check" onclick="handleTechniqueClick('T0019.002')"></td>
<td id="T0023.002">T0023.002 Edit Open-Source Content<input type="checkbox" id="T0023.002check" onclick="handleTechniqueClick('T0023.002')"></td>
<td id="T0043.002">T0043.002 Use Unencrypted Chats Apps<input type="checkbox" id="T0043.002check" onclick="handleTechniqueClick('T0043.002')"></td>
<td id="T0044">T0044 Seed Distortions<input type="checkbox" id="T0044check" onclick="handleTechniqueClick('T0044')"></td>
<td id="T0045">T0045 Use Fake Experts<input type="checkbox" id="T0045check" onclick="handleTechniqueClick('T0045')"></td>
<td id="T0115">T0115 Post Content<input type="checkbox" id="T0115check" onclick="handleTechniqueClick('T0115')"></td>
<td id="T0057.001">T0057.001 Pay for Physical Action<input type="checkbox" id="T0057.001check" onclick="handleTechniqueClick('T0057.001')"></td>
<td id="T0128.001">T0128.001 Use Pseudonyms<input type="checkbox" id="T0128.001check" onclick="handleTechniqueClick('T0128.001')"></td>
@ -127,17 +127,17 @@ function handleTechniqueClick(box) {
<td id="T0072.003">T0072.003 Economic Segmentation<input type="checkbox" id="T0072.003check" onclick="handleTechniqueClick('T0072.003')"></td>
<td id="T0022.001">T0022.001 Amplify Existing Conspiracy Theory Narratives<input type="checkbox" id="T0022.001check" onclick="handleTechniqueClick('T0022.001')"></td>
<td id="T0014">T0014 Prepare Fundraising Campaigns<input type="checkbox" id="T0014check" onclick="handleTechniqueClick('T0014')"></td>
<td id="T0097">T0097 Create Personas<input type="checkbox" id="T0097check" onclick="handleTechniqueClick('T0097')"></td>
<td id="T0049.003">T0049.003 Bots Amplify via Automated Forwarding and Reposting<input type="checkbox" id="T0049.003check" onclick="handleTechniqueClick('T0049.003')"></td>
<td id="T0097.001">T0097.001 Produce Evidence for Persona<input type="checkbox" id="T0097.001check" onclick="handleTechniqueClick('T0097.001')"></td>
<td id="T0049.002">T0049.002 Flood Existing Hashtag<input type="checkbox" id="T0049.002check" onclick="handleTechniqueClick('T0049.002')"></td>
<td id="T0048.002">T0048.002 Harass People Based on Identities<input type="checkbox" id="T0048.002check" onclick="handleTechniqueClick('T0048.002')"></td>
</tr>
<tr>
<td id="T0074.003">T0074.003 Economic Advantage<input type="checkbox" id="T0074.003check" onclick="handleTechniqueClick('T0074.003')"></td>
<td id="T0076">T0076 Distort<input type="checkbox" id="T0076check" onclick="handleTechniqueClick('T0076')"></td>
<td id="T0102.001">T0102.001 Use Existing Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102.001check" onclick="handleTechniqueClick('T0102.001')"></td>
<td id="T0023">T0023 Distort Facts<input type="checkbox" id="T0023check" onclick="handleTechniqueClick('T0023')"></td>
<td id="T0084">T0084 Reuse Existing Content<input type="checkbox" id="T0084check" onclick="handleTechniqueClick('T0084')"></td>
<td id="T0103">T0103 Livestream<input type="checkbox" id="T0103check" onclick="handleTechniqueClick('T0103')"></td>
<td id="T0045">T0045 Use Fake Experts<input type="checkbox" id="T0045check" onclick="handleTechniqueClick('T0045')"></td>
<td id="T0046">T0046 Use Search Engine Optimisation<input type="checkbox" id="T0046check" onclick="handleTechniqueClick('T0046')"></td>
<td id="T0115.001">T0115.001 Share Memes<input type="checkbox" id="T0115.001check" onclick="handleTechniqueClick('T0115.001')"></td>
<td id="T0057.002">T0057.002 Conduct Symbolic Action<input type="checkbox" id="T0057.002check" onclick="handleTechniqueClick('T0057.002')"></td>
<td id="T0128.002">T0128.002 Conceal Network Identity<input type="checkbox" id="T0128.002check" onclick="handleTechniqueClick('T0128.002')"></td>
@ -145,17 +145,17 @@ function handleTechniqueClick(box) {
<td id="T0072.004">T0072.004 Psychographic Segmentation<input type="checkbox" id="T0072.004check" onclick="handleTechniqueClick('T0072.004')"></td>
<td id="T0022.002">T0022.002 Develop Original Conspiracy Theory Narratives<input type="checkbox" id="T0022.002check" onclick="handleTechniqueClick('T0022.002')"></td>
<td id="T0014.001">T0014.001 Raise Funds from Malign Actors<input type="checkbox" id="T0014.001check" onclick="handleTechniqueClick('T0014.001')"></td>
<td id="T0097.001">T0097.001 Backstop Personas<input type="checkbox" id="T0097.001check" onclick="handleTechniqueClick('T0097.001')"></td>
<td id="T0049.004">T0049.004 Utilise Spamoflauge<input type="checkbox" id="T0049.004check" onclick="handleTechniqueClick('T0049.004')"></td>
<td id="T0098">T0098 Establish Inauthentic News Sites<input type="checkbox" id="T0098check" onclick="handleTechniqueClick('T0098')"></td>
<td id="T0049.003">T0049.003 Bots Amplify via Automated Forwarding and Reposting<input type="checkbox" id="T0049.003check" onclick="handleTechniqueClick('T0049.003')"></td>
<td id="T0048.003">T0048.003 Threaten to Dox<input type="checkbox" id="T0048.003check" onclick="handleTechniqueClick('T0048.003')"></td>
</tr>
<tr>
<td id="T0074.004">T0074.004 Ideological Advantage<input type="checkbox" id="T0074.004check" onclick="handleTechniqueClick('T0074.004')"></td>
<td id="T0077">T0077 Distract<input type="checkbox" id="T0077check" onclick="handleTechniqueClick('T0077')"></td>
<td id="T0102.002">T0102.002 Create Echo Chambers/Filter Bubbles<input type="checkbox" id="T0102.002check" onclick="handleTechniqueClick('T0102.002')"></td>
<td id="T0023.001">T0023.001 Reframe Context<input type="checkbox" id="T0023.001check" onclick="handleTechniqueClick('T0023.001')"></td>
<td id="T0084.001">T0084.001 Use Copypasta<input type="checkbox" id="T0084.001check" onclick="handleTechniqueClick('T0084.001')"></td>
<td id="T0103.001">T0103.001 Video Livestream<input type="checkbox" id="T0103.001check" onclick="handleTechniqueClick('T0103.001')"></td>
<td id="T0046">T0046 Use Search Engine Optimisation<input type="checkbox" id="T0046check" onclick="handleTechniqueClick('T0046')"></td>
<td bgcolor=white> </td>
<td id="T0115.002">T0115.002 Post Violative Content to Provoke Takedown and Backlash<input type="checkbox" id="T0115.002check" onclick="handleTechniqueClick('T0115.002')"></td>
<td id="T0061">T0061 Sell Merchandise<input type="checkbox" id="T0061check" onclick="handleTechniqueClick('T0061')"></td>
<td id="T0128.003">T0128.003 Distance Reputable Individuals from Operation<input type="checkbox" id="T0128.003check" onclick="handleTechniqueClick('T0128.003')"></td>
@ -163,17 +163,17 @@ function handleTechniqueClick(box) {
<td id="T0072.005">T0072.005 Political Segmentation<input type="checkbox" id="T0072.005check" onclick="handleTechniqueClick('T0072.005')"></td>
<td id="T0040">T0040 Demand Insurmountable Proof<input type="checkbox" id="T0040check" onclick="handleTechniqueClick('T0040')"></td>
<td id="T0014.002">T0014.002 Raise Funds from Ignorant Agents<input type="checkbox" id="T0014.002check" onclick="handleTechniqueClick('T0014.002')"></td>
<td id="T0098">T0098 Establish Inauthentic News Sites<input type="checkbox" id="T0098check" onclick="handleTechniqueClick('T0098')"></td>
<td id="T0049.005">T0049.005 Conduct Swarming<input type="checkbox" id="T0049.005check" onclick="handleTechniqueClick('T0049.005')"></td>
<td id="T0098.001">T0098.001 Create Inauthentic News Sites<input type="checkbox" id="T0098.001check" onclick="handleTechniqueClick('T0098.001')"></td>
<td id="T0049.004">T0049.004 Utilise Spamoflauge<input type="checkbox" id="T0049.004check" onclick="handleTechniqueClick('T0049.004')"></td>
<td id="T0048.004">T0048.004 Dox<input type="checkbox" id="T0048.004check" onclick="handleTechniqueClick('T0048.004')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0078">T0078 Dismay<input type="checkbox" id="T0078check" onclick="handleTechniqueClick('T0078')"></td>
<td id="T0102.003">T0102.003 Exploit Data Voids<input type="checkbox" id="T0102.003check" onclick="handleTechniqueClick('T0102.003')"></td>
<td id="T0023.002">T0023.002 Edit Open-Source Content<input type="checkbox" id="T0023.002check" onclick="handleTechniqueClick('T0023.002')"></td>
<td id="T0084.002">T0084.002 Plagiarise Content<input type="checkbox" id="T0084.002check" onclick="handleTechniqueClick('T0084.002')"></td>
<td id="T0103.002">T0103.002 Audio Livestream<input type="checkbox" id="T0103.002check" onclick="handleTechniqueClick('T0103.002')"></td>
<td id="T0113">T0113 Employ Commercial Analytic Firms<input type="checkbox" id="T0113check" onclick="handleTechniqueClick('T0113')"></td>
<td bgcolor=white> </td>
<td id="T0115.003">T0115.003 One-Way Direct Posting<input type="checkbox" id="T0115.003check" onclick="handleTechniqueClick('T0115.003')"></td>
<td id="T0126">T0126 Encourage Attendance at Events<input type="checkbox" id="T0126check" onclick="handleTechniqueClick('T0126')"></td>
<td id="T0128.004">T0128.004 Launder Information Assets<input type="checkbox" id="T0128.004check" onclick="handleTechniqueClick('T0128.004')"></td>
@ -181,15 +181,15 @@ function handleTechniqueClick(box) {
<td id="T0080">T0080 Map Target Audience Information Environment<input type="checkbox" id="T0080check" onclick="handleTechniqueClick('T0080')"></td>
<td id="T0068">T0068 Respond to Breaking News Event or Active Crisis<input type="checkbox" id="T0068check" onclick="handleTechniqueClick('T0068')"></td>
<td id="T0065">T0065 Prepare Physical Broadcast Capabilities<input type="checkbox" id="T0065check" onclick="handleTechniqueClick('T0065')"></td>
<td id="T0098.001">T0098.001 Create Inauthentic News Sites<input type="checkbox" id="T0098.001check" onclick="handleTechniqueClick('T0098.001')"></td>
<td id="T0049.006">T0049.006 Conduct Keyword Squatting<input type="checkbox" id="T0049.006check" onclick="handleTechniqueClick('T0049.006')"></td>
<td id="T0098.002">T0098.002 Leverage Existing Inauthentic News Sites<input type="checkbox" id="T0098.002check" onclick="handleTechniqueClick('T0098.002')"></td>
<td id="T0049.005">T0049.005 Conduct Swarming<input type="checkbox" id="T0049.005check" onclick="handleTechniqueClick('T0049.005')"></td>
<td id="T0123">T0123 Control Information Environment through Offensive Cyberspace Operations<input type="checkbox" id="T0123check" onclick="handleTechniqueClick('T0123')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0079">T0079 Divide<input type="checkbox" id="T0079check" onclick="handleTechniqueClick('T0079')"></td>
<td bgcolor=white> </td>
<td id="T0084">T0084 Reuse Existing Content<input type="checkbox" id="T0084check" onclick="handleTechniqueClick('T0084')"></td>
<td id="T0084.003">T0084.003 Deceptively Labelled or Translated<input type="checkbox" id="T0084.003check" onclick="handleTechniqueClick('T0084.003')"></td>
<td id="T0104">T0104 Social Networks<input type="checkbox" id="T0104check" onclick="handleTechniqueClick('T0104')"></td>
<td bgcolor=white> </td>
<td id="T0116">T0116 Comment or Reply on Content<input type="checkbox" id="T0116check" onclick="handleTechniqueClick('T0116')"></td>
@ -199,15 +199,15 @@ function handleTechniqueClick(box) {
<td id="T0080.001">T0080.001 Monitor Social Media Analytics<input type="checkbox" id="T0080.001check" onclick="handleTechniqueClick('T0080.001')"></td>
<td id="T0082">T0082 Develop New Narratives<input type="checkbox" id="T0082check" onclick="handleTechniqueClick('T0082')"></td>
<td id="T0090">T0090 Create Inauthentic Accounts<input type="checkbox" id="T0090check" onclick="handleTechniqueClick('T0090')"></td>
<td id="T0098.002">T0098.002 Leverage Existing Inauthentic News Sites<input type="checkbox" id="T0098.002check" onclick="handleTechniqueClick('T0098.002')"></td>
<td id="T0049.007">T0049.007 Inauthentic Sites Amplify News and Narratives<input type="checkbox" id="T0049.007check" onclick="handleTechniqueClick('T0049.007')"></td>
<td id="T0099">T0099 Impersonate Existing Entity<input type="checkbox" id="T0099check" onclick="handleTechniqueClick('T0099')"></td>
<td id="T0049.006">T0049.006 Conduct Keyword Squatting<input type="checkbox" id="T0049.006check" onclick="handleTechniqueClick('T0049.006')"></td>
<td id="T0123.001">T0123.001 Delete Opposing Content<input type="checkbox" id="T0123.001check" onclick="handleTechniqueClick('T0123.001')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0135">T0135 Undermine<input type="checkbox" id="T0135check" onclick="handleTechniqueClick('T0135')"></td>
<td bgcolor=white> </td>
<td id="T0084.001">T0084.001 Use Copypasta<input type="checkbox" id="T0084.001check" onclick="handleTechniqueClick('T0084.001')"></td>
<td id="T0084.004">T0084.004 Appropriate Content<input type="checkbox" id="T0084.004check" onclick="handleTechniqueClick('T0084.004')"></td>
<td id="T0104.001">T0104.001 Mainstream Social Networks<input type="checkbox" id="T0104.001check" onclick="handleTechniqueClick('T0104.001')"></td>
<td bgcolor=white> </td>
<td id="T0116.001">T0116.001 Post Inauthentic Social Media Comment<input type="checkbox" id="T0116.001check" onclick="handleTechniqueClick('T0116.001')"></td>
@ -217,16 +217,16 @@ function handleTechniqueClick(box) {
<td id="T0080.002">T0080.002 Evaluate Media Surveys<input type="checkbox" id="T0080.002check" onclick="handleTechniqueClick('T0080.002')"></td>
<td id="T0083">T0083 Integrate Target Audience Vulnerabilities into Narrative<input type="checkbox" id="T0083check" onclick="handleTechniqueClick('T0083')"></td>
<td id="T0090.001">T0090.001 Create Anonymous Accounts<input type="checkbox" id="T0090.001check" onclick="handleTechniqueClick('T0090.001')"></td>
<td id="T0099">T0099 Prepare Assets Impersonating Legitimate Entities<input type="checkbox" id="T0099check" onclick="handleTechniqueClick('T0099')"></td>
<td id="T0118">T0118 Amplify Existing Narrative<input type="checkbox" id="T0118check" onclick="handleTechniqueClick('T0118')"></td>
<td id="T0099.002">T0099.002 Spoof/Parody Account/Site<input type="checkbox" id="T0099.002check" onclick="handleTechniqueClick('T0099.002')"></td>
<td id="T0049.007">T0049.007 Inauthentic Sites Amplify News and Narratives<input type="checkbox" id="T0049.007check" onclick="handleTechniqueClick('T0049.007')"></td>
<td id="T0123.002">T0123.002 Block Content<input type="checkbox" id="T0123.002check" onclick="handleTechniqueClick('T0123.002')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0135.001">T0135.001 Smear<input type="checkbox" id="T0135.001check" onclick="handleTechniqueClick('T0135.001')"></td>
<td bgcolor=white> </td>
<td id="T0084.002">T0084.002 Plagiarise Content<input type="checkbox" id="T0084.002check" onclick="handleTechniqueClick('T0084.002')"></td>
<td id="T0104.002">T0104.002 Dating Apps<input type="checkbox" id="T0104.002check" onclick="handleTechniqueClick('T0104.002')"></td>
<td id="T0085">T0085 Develop Text-Based Content<input type="checkbox" id="T0085check" onclick="handleTechniqueClick('T0085')"></td>
<td id="T0104.002">T0104.002 Dating App<input type="checkbox" id="T0104.002check" onclick="handleTechniqueClick('T0104.002')"></td>
<td bgcolor=white> </td>
<td id="T0117">T0117 Attract Traditional Media<input type="checkbox" id="T0117check" onclick="handleTechniqueClick('T0117')"></td>
<td id="T0127">T0127 Physical Violence<input type="checkbox" id="T0127check" onclick="handleTechniqueClick('T0127')"></td>
@ -235,15 +235,15 @@ function handleTechniqueClick(box) {
<td id="T0080.003">T0080.003 Identify Trending Topics/Hashtags<input type="checkbox" id="T0080.003check" onclick="handleTechniqueClick('T0080.003')"></td>
<td bgcolor=white> </td>
<td id="T0090.002">T0090.002 Create Cyborg Accounts<input type="checkbox" id="T0090.002check" onclick="handleTechniqueClick('T0090.002')"></td>
<td id="T0099.001">T0099.001 Astroturfing<input type="checkbox" id="T0099.001check" onclick="handleTechniqueClick('T0099.001')"></td>
<td id="T0119">T0119 Cross-Posting<input type="checkbox" id="T0119check" onclick="handleTechniqueClick('T0119')"></td>
<td id="T0099.003">T0099.003 Impersonate Existing Organisation<input type="checkbox" id="T0099.003check" onclick="handleTechniqueClick('T0099.003')"></td>
<td id="T0049.008">T0049.008 Generate Information Pollution<input type="checkbox" id="T0049.008check" onclick="handleTechniqueClick('T0049.008')"></td>
<td id="T0123.003">T0123.003 Destroy Information Generation Capabilities<input type="checkbox" id="T0123.003check" onclick="handleTechniqueClick('T0123.003')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0135.002">T0135.002 Thwart<input type="checkbox" id="T0135.002check" onclick="handleTechniqueClick('T0135.002')"></td>
<td bgcolor=white> </td>
<td id="T0084.003">T0084.003 Deceptively Labelled or Translated<input type="checkbox" id="T0084.003check" onclick="handleTechniqueClick('T0084.003')"></td>
<td id="T0085.001">T0085.001 Develop AI-Generated Text<input type="checkbox" id="T0085.001check" onclick="handleTechniqueClick('T0085.001')"></td>
<td id="T0104.003">T0104.003 Private/Closed Social Networks<input type="checkbox" id="T0104.003check" onclick="handleTechniqueClick('T0104.003')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -253,15 +253,15 @@ function handleTechniqueClick(box) {
<td id="T0080.004">T0080.004 Conduct Web Traffic Analysis<input type="checkbox" id="T0080.004check" onclick="handleTechniqueClick('T0080.004')"></td>
<td bgcolor=white> </td>
<td id="T0090.003">T0090.003 Create Bot Accounts<input type="checkbox" id="T0090.003check" onclick="handleTechniqueClick('T0090.003')"></td>
<td id="T0099.002">T0099.002 Spoof/Parody Account/Site<input type="checkbox" id="T0099.002check" onclick="handleTechniqueClick('T0099.002')"></td>
<td id="T0119.001">T0119.001 Post across Groups<input type="checkbox" id="T0119.001check" onclick="handleTechniqueClick('T0119.001')"></td>
<td id="T0099.004">T0099.004 Impersonate Existing Media Outlet<input type="checkbox" id="T0099.004check" onclick="handleTechniqueClick('T0099.004')"></td>
<td id="T0118">T0118 Amplify Existing Narrative<input type="checkbox" id="T0118check" onclick="handleTechniqueClick('T0118')"></td>
<td id="T0123.004">T0123.004 Conduct Server Redirect<input type="checkbox" id="T0123.004check" onclick="handleTechniqueClick('T0123.004')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0135.003">T0135.003 Subvert<input type="checkbox" id="T0135.003check" onclick="handleTechniqueClick('T0135.003')"></td>
<td bgcolor=white> </td>
<td id="T0084.004">T0084.004 Appropriate Content<input type="checkbox" id="T0084.004check" onclick="handleTechniqueClick('T0084.004')"></td>
<td id="T0085.003">T0085.003 Develop Inauthentic News Articles<input type="checkbox" id="T0085.003check" onclick="handleTechniqueClick('T0085.003')"></td>
<td id="T0104.004">T0104.004 Interest-Based Networks<input type="checkbox" id="T0104.004check" onclick="handleTechniqueClick('T0104.004')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -271,15 +271,15 @@ function handleTechniqueClick(box) {
<td id="T0080.005">T0080.005 Assess Degree/Type of Media Access<input type="checkbox" id="T0080.005check" onclick="handleTechniqueClick('T0080.005')"></td>
<td bgcolor=white> </td>
<td id="T0090.004">T0090.004 Create Sockpuppet Accounts<input type="checkbox" id="T0090.004check" onclick="handleTechniqueClick('T0090.004')"></td>
<td id="T0100">T0100 Co-Opt Trusted Sources<input type="checkbox" id="T0100check" onclick="handleTechniqueClick('T0100')"></td>
<td id="T0119.002">T0119.002 Post across Platform<input type="checkbox" id="T0119.002check" onclick="handleTechniqueClick('T0119.002')"></td>
<td id="T0099.005">T0099.005 Impersonate Existing Official<input type="checkbox" id="T0099.005check" onclick="handleTechniqueClick('T0099.005')"></td>
<td id="T0119">T0119 Cross-Posting<input type="checkbox" id="T0119check" onclick="handleTechniqueClick('T0119')"></td>
<td id="T0124">T0124 Suppress Opposition<input type="checkbox" id="T0124check" onclick="handleTechniqueClick('T0124')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0135.004">T0135.004 Polarise<input type="checkbox" id="T0135.004check" onclick="handleTechniqueClick('T0135.004')"></td>
<td bgcolor=white> </td>
<td id="T0085">T0085 Develop Text-Based Content<input type="checkbox" id="T0085check" onclick="handleTechniqueClick('T0085')"></td>
<td id="T0085.004">T0085.004 Develop Document<input type="checkbox" id="T0085.004check" onclick="handleTechniqueClick('T0085.004')"></td>
<td id="T0104.005">T0104.005 Use Hashtags<input type="checkbox" id="T0104.005check" onclick="handleTechniqueClick('T0104.005')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -289,15 +289,15 @@ function handleTechniqueClick(box) {
<td id="T0081">T0081 Identify Social and Technical Vulnerabilities<input type="checkbox" id="T0081check" onclick="handleTechniqueClick('T0081')"></td>
<td bgcolor=white> </td>
<td id="T0091">T0091 Recruit Malign Actors<input type="checkbox" id="T0091check" onclick="handleTechniqueClick('T0091')"></td>
<td id="T0100.001">T0100.001 Co-Opt Trusted Individuals<input type="checkbox" id="T0100.001check" onclick="handleTechniqueClick('T0100.001')"></td>
<td id="T0119.003">T0119.003 Post across Disciplines<input type="checkbox" id="T0119.003check" onclick="handleTechniqueClick('T0119.003')"></td>
<td id="T0099.006">T0099.006 Impersonate Existing Influencer<input type="checkbox" id="T0099.006check" onclick="handleTechniqueClick('T0099.006')"></td>
<td id="T0119.001">T0119.001 Post across Groups<input type="checkbox" id="T0119.001check" onclick="handleTechniqueClick('T0119.001')"></td>
<td id="T0124.001">T0124.001 Report Non-Violative Opposing Content<input type="checkbox" id="T0124.001check" onclick="handleTechniqueClick('T0124.001')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0136">T0136 Cultivate Support<input type="checkbox" id="T0136check" onclick="handleTechniqueClick('T0136')"></td>
<td bgcolor=white> </td>
<td id="T0085.001">T0085.001 Develop AI-Generated Text<input type="checkbox" id="T0085.001check" onclick="handleTechniqueClick('T0085.001')"></td>
<td id="T0085.005">T0085.005 Develop Book<input type="checkbox" id="T0085.005check" onclick="handleTechniqueClick('T0085.005')"></td>
<td id="T0104.006">T0104.006 Create Dedicated Hashtag<input type="checkbox" id="T0104.006check" onclick="handleTechniqueClick('T0104.006')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -307,15 +307,15 @@ function handleTechniqueClick(box) {
<td id="T0081.001">T0081.001 Find Echo Chambers<input type="checkbox" id="T0081.001check" onclick="handleTechniqueClick('T0081.001')"></td>
<td bgcolor=white> </td>
<td id="T0091.001">T0091.001 Recruit Contractors<input type="checkbox" id="T0091.001check" onclick="handleTechniqueClick('T0091.001')"></td>
<td id="T0100.002">T0100.002 Co-Opt Grassroots Groups<input type="checkbox" id="T0100.002check" onclick="handleTechniqueClick('T0100.002')"></td>
<td id="T0120">T0120 Incentivize Sharing<input type="checkbox" id="T0120check" onclick="handleTechniqueClick('T0120')"></td>
<td id="T0100">T0100 Co-Opt Trusted Sources<input type="checkbox" id="T0100check" onclick="handleTechniqueClick('T0100')"></td>
<td id="T0119.002">T0119.002 Post across Platform<input type="checkbox" id="T0119.002check" onclick="handleTechniqueClick('T0119.002')"></td>
<td id="T0124.002">T0124.002 Goad People into Harmful Action (Stop Hitting Yourself)<input type="checkbox" id="T0124.002check" onclick="handleTechniqueClick('T0124.002')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0136.001">T0136.001 Defend Reputaton<input type="checkbox" id="T0136.001check" onclick="handleTechniqueClick('T0136.001')"></td>
<td bgcolor=white> </td>
<td id="T0085.002">T0085.002 Develop False or Altered Documents<input type="checkbox" id="T0085.002check" onclick="handleTechniqueClick('T0085.002')"></td>
<td id="T0085.006">T0085.006 Develop Opinion Article<input type="checkbox" id="T0085.006check" onclick="handleTechniqueClick('T0085.006')"></td>
<td id="T0105">T0105 Media Sharing Networks<input type="checkbox" id="T0105check" onclick="handleTechniqueClick('T0105')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -325,15 +325,15 @@ function handleTechniqueClick(box) {
<td id="T0081.002">T0081.002 Identify Data Voids<input type="checkbox" id="T0081.002check" onclick="handleTechniqueClick('T0081.002')"></td>
<td bgcolor=white> </td>
<td id="T0091.002">T0091.002 Recruit Partisans<input type="checkbox" id="T0091.002check" onclick="handleTechniqueClick('T0091.002')"></td>
<td id="T0100.003">T0100.003 Co-Opt Influencers<input type="checkbox" id="T0100.003check" onclick="handleTechniqueClick('T0100.003')"></td>
<td id="T0120.001">T0120.001 Use Affiliate Marketing Programmes<input type="checkbox" id="T0120.001check" onclick="handleTechniqueClick('T0120.001')"></td>
<td id="T0100.001">T0100.001 Co-Opt Trusted Individuals<input type="checkbox" id="T0100.001check" onclick="handleTechniqueClick('T0100.001')"></td>
<td id="T0119.003">T0119.003 Post across Disciplines<input type="checkbox" id="T0119.003check" onclick="handleTechniqueClick('T0119.003')"></td>
<td id="T0124.003">T0124.003 Exploit Platform TOS/Content Moderation<input type="checkbox" id="T0124.003check" onclick="handleTechniqueClick('T0124.003')"></td>
</tr>
<tr>
<td bgcolor=white> </td>
<td id="T0136.002">T0136.002 Justify Action<input type="checkbox" id="T0136.002check" onclick="handleTechniqueClick('T0136.002')"></td>
<td bgcolor=white> </td>
<td id="T0085.003">T0085.003 Develop Inauthentic News Articles<input type="checkbox" id="T0085.003check" onclick="handleTechniqueClick('T0085.003')"></td>
<td id="T0085.007">T0085.007 Create Fake Research<input type="checkbox" id="T0085.007check" onclick="handleTechniqueClick('T0085.007')"></td>
<td id="T0105.001">T0105.001 Photo Sharing<input type="checkbox" id="T0105.001check" onclick="handleTechniqueClick('T0105.001')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -343,8 +343,8 @@ function handleTechniqueClick(box) {
<td id="T0081.003">T0081.003 Identify Existing Prejudices<input type="checkbox" id="T0081.003check" onclick="handleTechniqueClick('T0081.003')"></td>
<td bgcolor=white> </td>
<td id="T0091.003">T0091.003 Enlist Troll Accounts<input type="checkbox" id="T0091.003check" onclick="handleTechniqueClick('T0091.003')"></td>
<td bgcolor=white> </td>
<td id="T0120.002">T0120.002 Use Contests and Prizes<input type="checkbox" id="T0120.002check" onclick="handleTechniqueClick('T0120.002')"></td>
<td id="T0100.002">T0100.002 Co-Opt Grassroots Groups<input type="checkbox" id="T0100.002check" onclick="handleTechniqueClick('T0100.002')"></td>
<td id="T0120">T0120 Incentivize Sharing<input type="checkbox" id="T0120check" onclick="handleTechniqueClick('T0120')"></td>
<td id="T0125">T0125 Platform Filtering<input type="checkbox" id="T0125check" onclick="handleTechniqueClick('T0125')"></td>
</tr>
<tr>
@ -361,8 +361,8 @@ function handleTechniqueClick(box) {
<td id="T0081.004">T0081.004 Identify Existing Fissures<input type="checkbox" id="T0081.004check" onclick="handleTechniqueClick('T0081.004')"></td>
<td bgcolor=white> </td>
<td id="T0092">T0092 Build Network<input type="checkbox" id="T0092check" onclick="handleTechniqueClick('T0092')"></td>
<td bgcolor=white> </td>
<td id="T0121">T0121 Manipulate Platform Algorithm<input type="checkbox" id="T0121check" onclick="handleTechniqueClick('T0121')"></td>
<td id="T0100.003">T0100.003 Co-Opt Influencers<input type="checkbox" id="T0100.003check" onclick="handleTechniqueClick('T0100.003')"></td>
<td id="T0120.001">T0120.001 Use Affiliate Marketing Programmes<input type="checkbox" id="T0120.001check" onclick="handleTechniqueClick('T0120.001')"></td>
<td bgcolor=white> </td>
</tr>
<tr>
@ -379,8 +379,8 @@ function handleTechniqueClick(box) {
<td id="T0081.005">T0081.005 Identify Existing Conspiracy Narratives/Suspicions<input type="checkbox" id="T0081.005check" onclick="handleTechniqueClick('T0081.005')"></td>
<td bgcolor=white> </td>
<td id="T0092.001">T0092.001 Create Organisations<input type="checkbox" id="T0092.001check" onclick="handleTechniqueClick('T0092.001')"></td>
<td bgcolor=white> </td>
<td id="T0121.001">T0121.001 Bypass Content Blocking<input type="checkbox" id="T0121.001check" onclick="handleTechniqueClick('T0121.001')"></td>
<td id="T0142">T0142 Fabricate Grassroots Movement<input type="checkbox" id="T0142check" onclick="handleTechniqueClick('T0142')"></td>
<td id="T0120.002">T0120.002 Use Contests and Prizes<input type="checkbox" id="T0120.002check" onclick="handleTechniqueClick('T0120.002')"></td>
<td bgcolor=white> </td>
</tr>
<tr>
@ -398,7 +398,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td id="T0092.002">T0092.002 Use Follow Trains<input type="checkbox" id="T0092.002check" onclick="handleTechniqueClick('T0092.002')"></td>
<td bgcolor=white> </td>
<td id="T0122">T0122 Direct Users to Alternative Platforms<input type="checkbox" id="T0122check" onclick="handleTechniqueClick('T0122')"></td>
<td id="T0121">T0121 Manipulate Platform Algorithm<input type="checkbox" id="T0121check" onclick="handleTechniqueClick('T0121')"></td>
<td bgcolor=white> </td>
</tr>
<tr>
@ -416,7 +416,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td id="T0092.003">T0092.003 Create Community or Sub-Group<input type="checkbox" id="T0092.003check" onclick="handleTechniqueClick('T0092.003')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0121.001">T0121.001 Bypass Content Blocking<input type="checkbox" id="T0121.001check" onclick="handleTechniqueClick('T0121.001')"></td>
<td bgcolor=white> </td>
</tr>
<tr>
@ -434,7 +434,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td id="T0093">T0093 Acquire/Recruit Network<input type="checkbox" id="T0093check" onclick="handleTechniqueClick('T0093')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0122">T0122 Direct Users to Alternative Platforms<input type="checkbox" id="T0122check" onclick="handleTechniqueClick('T0122')"></td>
<td bgcolor=white> </td>
</tr>
<tr>
@ -585,7 +585,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td id="T0138">T0138 Motivate to Act<input type="checkbox" id="T0138check" onclick="handleTechniqueClick('T0138')"></td>
<td bgcolor=white> </td>
<td id="T0089.002">T0089.002 Create Inauthentic Documents<input type="checkbox" id="T0089.002check" onclick="handleTechniqueClick('T0089.002')"></td>
<td id="T0089.003">T0089.003 Alter Authentic Documents<input type="checkbox" id="T0089.003check" onclick="handleTechniqueClick('T0089.003')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -603,7 +603,6 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td id="T0138.001">T0138.001 Encourage<input type="checkbox" id="T0138.001check" onclick="handleTechniqueClick('T0138.001')"></td>
<td bgcolor=white> </td>
<td id="T0089.003">T0089.003 Alter Authentic Documents<input type="checkbox" id="T0089.003check" onclick="handleTechniqueClick('T0089.003')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -613,6 +612,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0113">T0113 Employ Commercial Analytic Firms<input type="checkbox" id="T0113check" onclick="handleTechniqueClick('T0113')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -630,7 +630,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0141">T0141 Acquire Compromised Asset<input type="checkbox" id="T0141check" onclick="handleTechniqueClick('T0141')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -648,7 +648,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0141.001">T0141.001 Acquire Compromised Account<input type="checkbox" id="T0141.001check" onclick="handleTechniqueClick('T0141.001')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -666,7 +666,7 @@ function handleTechniqueClick(box) {
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td id="T0141.002">T0141.002 Acquire Compromised Website<input type="checkbox" id="T0141.002check" onclick="handleTechniqueClick('T0141.002')"></td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
<td bgcolor=white> </td>
@ -816,14 +816,14 @@ function handleTechniqueClick(box) {
<li id="T0003text" style="display:none">T0003: Leverage Existing Narratives</li>
<li id="T0007text" style="display:none">T0007: Create Inauthentic Social Media Pages and Groups</li>
<li id="T0009text" style="display:none">T0009: Create Fake Experts</li>
<li id="T0049text" style="display:none">T0049: Flooding the Information Space</li>
<li id="T0039text" style="display:none">T0039: Bait Influencer</li>
<li id="T0047text" style="display:none">T0047: Censor Social Media as a Political Force</li>
<li id="T0074text" style="display:none">T0074: Determine Strategic Ends</li>
<li id="T0066text" style="display:none">T0066: Degrade Adversary</li>
<li id="T0018text" style="display:none">T0018: Purchase Targeted Advertisements</li>
<li id="T0019text" style="display:none">T0019: Generate Information Pollution</li>
<li id="T0023text" style="display:none">T0023: Distort Facts</li>
<li id="T0043text" style="display:none">T0043: Chat Apps</li>
<li id="T0039text" style="display:none">T0039: Bait Legitimate Influencers</li>
<li id="T0042text" style="display:none">T0042: Seed Kernel of Truth</li>
<li id="T0114.001text" style="display:none">T0114.001: Social Media</li>
<li id="T0017.001text" style="display:none">T0017.001: Conduct Crowdfunding Campaigns</li>
<li id="T0060text" style="display:none">T0060: Continue to Amplify</li>
@ -832,14 +832,14 @@ function handleTechniqueClick(box) {
<li id="T0004text" style="display:none">T0004: Develop Competing Narratives</li>
<li id="T0010text" style="display:none">T0010: Cultivate Ignorant Agents</li>
<li id="T0009.001text" style="display:none">T0009.001: Utilise Academic/Pseudoscientific Justifications</li>
<li id="T0049.001text" style="display:none">T0049.001: Trolls Amplify and Manipulate</li>
<li id="T0049text" style="display:none">T0049: Flood Information Space</li>
<li id="T0048text" style="display:none">T0048: Harass</li>
<li id="T0074.001text" style="display:none">T0074.001: Geopolitical Advantage</li>
<li id="T0075text" style="display:none">T0075: Dismiss</li>
<li id="T0101text" style="display:none">T0101: Create Localised Content</li>
<li id="T0019.001text" style="display:none">T0019.001: Create Fake Research</li>
<li id="T0023.001text" style="display:none">T0023.001: Reframe Context</li>
<li id="T0043.001text" style="display:none">T0043.001: Use Encrypted Chat Apps</li>
<li id="T0042text" style="display:none">T0042: Seed Kernel of Truth</li>
<li id="T0044text" style="display:none">T0044: Seed Distortions</li>
<li id="T0114.002text" style="display:none">T0114.002: Traditional Media</li>
<li id="T0057text" style="display:none">T0057: Organise Events</li>
<li id="T0128text" style="display:none">T0128: Conceal Information Assets</li>
@ -847,15 +847,15 @@ function handleTechniqueClick(box) {
<li id="T0072.002text" style="display:none">T0072.002: Demographic Segmentation</li>
<li id="T0022text" style="display:none">T0022: Leverage Conspiracy Theory Narratives</li>
<li id="T0013text" style="display:none">T0013: Create Inauthentic Websites</li>
<li id="T0011text" style="display:none">T0011: Compromise Legitimate Accounts</li>
<li id="T0049.002text" style="display:none">T0049.002: Hijack Existing Hashtag</li>
<li id="T0097text" style="display:none">T0097: Create Personas</li>
<li id="T0049.001text" style="display:none">T0049.001: Trolls Amplify and Manipulate</li>
<li id="T0048.001text" style="display:none">T0048.001: Boycott/"Cancel" Opponents</li>
<li id="T0074.002text" style="display:none">T0074.002: Domestic Political Advantage</li>
<li id="T0075.001text" style="display:none">T0075.001: Discredit Credible Sources</li>
<li id="T0102text" style="display:none">T0102: Leverage Echo Chambers/Filter Bubbles</li>
<li id="T0019.002text" style="display:none">T0019.002: Hijack Hashtags</li>
<li id="T0023.002text" style="display:none">T0023.002: Edit Open-Source Content</li>
<li id="T0043.002text" style="display:none">T0043.002: Use Unencrypted Chats Apps</li>
<li id="T0044text" style="display:none">T0044: Seed Distortions</li>
<li id="T0045text" style="display:none">T0045: Use Fake Experts</li>
<li id="T0115text" style="display:none">T0115: Post Content</li>
<li id="T0057.001text" style="display:none">T0057.001: Pay for Physical Action</li>
<li id="T0128.001text" style="display:none">T0128.001: Use Pseudonyms</li>
@ -863,15 +863,15 @@ function handleTechniqueClick(box) {
<li id="T0072.003text" style="display:none">T0072.003: Economic Segmentation</li>
<li id="T0022.001text" style="display:none">T0022.001: Amplify Existing Conspiracy Theory Narratives</li>
<li id="T0014text" style="display:none">T0014: Prepare Fundraising Campaigns</li>
<li id="T0097text" style="display:none">T0097: Create Personas</li>
<li id="T0049.003text" style="display:none">T0049.003: Bots Amplify via Automated Forwarding and Reposting</li>
<li id="T0097.001text" style="display:none">T0097.001: Produce Evidence for Persona</li>
<li id="T0049.002text" style="display:none">T0049.002: Flood Existing Hashtag</li>
<li id="T0048.002text" style="display:none">T0048.002: Harass People Based on Identities</li>
<li id="T0074.003text" style="display:none">T0074.003: Economic Advantage</li>
<li id="T0076text" style="display:none">T0076: Distort</li>
<li id="T0102.001text" style="display:none">T0102.001: Use Existing Echo Chambers/Filter Bubbles</li>
<li id="T0023text" style="display:none">T0023: Distort Facts</li>
<li id="T0084text" style="display:none">T0084: Reuse Existing Content</li>
<li id="T0103text" style="display:none">T0103: Livestream</li>
<li id="T0045text" style="display:none">T0045: Use Fake Experts</li>
<li id="T0046text" style="display:none">T0046: Use Search Engine Optimisation</li>
<li id="T0115.001text" style="display:none">T0115.001: Share Memes</li>
<li id="T0057.002text" style="display:none">T0057.002: Conduct Symbolic Action</li>
<li id="T0128.002text" style="display:none">T0128.002: Conceal Network Identity</li>
@ -879,15 +879,14 @@ function handleTechniqueClick(box) {
<li id="T0072.004text" style="display:none">T0072.004: Psychographic Segmentation</li>
<li id="T0022.002text" style="display:none">T0022.002: Develop Original Conspiracy Theory Narratives</li>
<li id="T0014.001text" style="display:none">T0014.001: Raise Funds from Malign Actors</li>
<li id="T0097.001text" style="display:none">T0097.001: Backstop Personas</li>
<li id="T0049.004text" style="display:none">T0049.004: Utilise Spamoflauge</li>
<li id="T0098text" style="display:none">T0098: Establish Inauthentic News Sites</li>
<li id="T0049.003text" style="display:none">T0049.003: Bots Amplify via Automated Forwarding and Reposting</li>
<li id="T0048.003text" style="display:none">T0048.003: Threaten to Dox</li>
<li id="T0074.004text" style="display:none">T0074.004: Ideological Advantage</li>
<li id="T0077text" style="display:none">T0077: Distract</li>
<li id="T0102.002text" style="display:none">T0102.002: Create Echo Chambers/Filter Bubbles</li>
<li id="T0023.001text" style="display:none">T0023.001: Reframe Context</li>
<li id="T0084.001text" style="display:none">T0084.001: Use Copypasta</li>
<li id="T0103.001text" style="display:none">T0103.001: Video Livestream</li>
<li id="T0046text" style="display:none">T0046: Use Search Engine Optimisation</li>
<li id="T0115.002text" style="display:none">T0115.002: Post Violative Content to Provoke Takedown and Backlash</li>
<li id="T0061text" style="display:none">T0061: Sell Merchandise</li>
<li id="T0128.003text" style="display:none">T0128.003: Distance Reputable Individuals from Operation</li>
@ -895,14 +894,13 @@ function handleTechniqueClick(box) {
<li id="T0072.005text" style="display:none">T0072.005: Political Segmentation</li>
<li id="T0040text" style="display:none">T0040: Demand Insurmountable Proof</li>
<li id="T0014.002text" style="display:none">T0014.002: Raise Funds from Ignorant Agents</li>
<li id="T0098text" style="display:none">T0098: Establish Inauthentic News Sites</li>
<li id="T0049.005text" style="display:none">T0049.005: Conduct Swarming</li>
<li id="T0098.001text" style="display:none">T0098.001: Create Inauthentic News Sites</li>
<li id="T0049.004text" style="display:none">T0049.004: Utilise Spamoflauge</li>
<li id="T0048.004text" style="display:none">T0048.004: Dox</li>
<li id="T0078text" style="display:none">T0078: Dismay</li>
<li id="T0102.003text" style="display:none">T0102.003: Exploit Data Voids</li>
<li id="T0023.002text" style="display:none">T0023.002: Edit Open-Source Content</li>
<li id="T0084.002text" style="display:none">T0084.002: Plagiarise Content</li>
<li id="T0103.002text" style="display:none">T0103.002: Audio Livestream</li>
<li id="T0113text" style="display:none">T0113: Employ Commercial Analytic Firms</li>
<li id="T0115.003text" style="display:none">T0115.003: One-Way Direct Posting</li>
<li id="T0126text" style="display:none">T0126: Encourage Attendance at Events</li>
<li id="T0128.004text" style="display:none">T0128.004: Launder Information Assets</li>
@ -910,11 +908,11 @@ function handleTechniqueClick(box) {
<li id="T0080text" style="display:none">T0080: Map Target Audience Information Environment</li>
<li id="T0068text" style="display:none">T0068: Respond to Breaking News Event or Active Crisis</li>
<li id="T0065text" style="display:none">T0065: Prepare Physical Broadcast Capabilities</li>
<li id="T0098.001text" style="display:none">T0098.001: Create Inauthentic News Sites</li>
<li id="T0049.006text" style="display:none">T0049.006: Conduct Keyword Squatting</li>
<li id="T0098.002text" style="display:none">T0098.002: Leverage Existing Inauthentic News Sites</li>
<li id="T0049.005text" style="display:none">T0049.005: Conduct Swarming</li>
<li id="T0123text" style="display:none">T0123: Control Information Environment through Offensive Cyberspace Operations</li>
<li id="T0079text" style="display:none">T0079: Divide</li>
<li id="T0084text" style="display:none">T0084: Reuse Existing Content</li>
<li id="T0084.003text" style="display:none">T0084.003: Deceptively Labelled or Translated</li>
<li id="T0104text" style="display:none">T0104: Social Networks</li>
<li id="T0116text" style="display:none">T0116: Comment or Reply on Content</li>
<li id="T0126.001text" style="display:none">T0126.001: Call to Action to Attend</li>
@ -923,11 +921,11 @@ function handleTechniqueClick(box) {
<li id="T0080.001text" style="display:none">T0080.001: Monitor Social Media Analytics</li>
<li id="T0082text" style="display:none">T0082: Develop New Narratives</li>
<li id="T0090text" style="display:none">T0090: Create Inauthentic Accounts</li>
<li id="T0098.002text" style="display:none">T0098.002: Leverage Existing Inauthentic News Sites</li>
<li id="T0049.007text" style="display:none">T0049.007: Inauthentic Sites Amplify News and Narratives</li>
<li id="T0099text" style="display:none">T0099: Impersonate Existing Entity</li>
<li id="T0049.006text" style="display:none">T0049.006: Conduct Keyword Squatting</li>
<li id="T0123.001text" style="display:none">T0123.001: Delete Opposing Content</li>
<li id="T0135text" style="display:none">T0135: Undermine</li>
<li id="T0084.001text" style="display:none">T0084.001: Use Copypasta</li>
<li id="T0084.004text" style="display:none">T0084.004: Appropriate Content</li>
<li id="T0104.001text" style="display:none">T0104.001: Mainstream Social Networks</li>
<li id="T0116.001text" style="display:none">T0116.001: Post Inauthentic Social Media Comment</li>
<li id="T0126.002text" style="display:none">T0126.002: Facilitate Logistics or Support for Attendance</li>
@ -936,78 +934,79 @@ function handleTechniqueClick(box) {
<li id="T0080.002text" style="display:none">T0080.002: Evaluate Media Surveys</li>
<li id="T0083text" style="display:none">T0083: Integrate Target Audience Vulnerabilities into Narrative</li>
<li id="T0090.001text" style="display:none">T0090.001: Create Anonymous Accounts</li>
<li id="T0099text" style="display:none">T0099: Prepare Assets Impersonating Legitimate Entities</li>
<li id="T0118text" style="display:none">T0118: Amplify Existing Narrative</li>
<li id="T0099.002text" style="display:none">T0099.002: Spoof/Parody Account/Site</li>
<li id="T0049.007text" style="display:none">T0049.007: Inauthentic Sites Amplify News and Narratives</li>
<li id="T0123.002text" style="display:none">T0123.002: Block Content</li>
<li id="T0135.001text" style="display:none">T0135.001: Smear</li>
<li id="T0084.002text" style="display:none">T0084.002: Plagiarise Content</li>
<li id="T0104.002text" style="display:none">T0104.002: Dating Apps</li>
<li id="T0085text" style="display:none">T0085: Develop Text-Based Content</li>
<li id="T0104.002text" style="display:none">T0104.002: Dating App</li>
<li id="T0117text" style="display:none">T0117: Attract Traditional Media</li>
<li id="T0127text" style="display:none">T0127: Physical Violence</li>
<li id="T0129.001text" style="display:none">T0129.001: Conceal Network Identity</li>
<li id="T0133.005text" style="display:none">T0133.005: Action/Attitude</li>
<li id="T0080.003text" style="display:none">T0080.003: Identify Trending Topics/Hashtags</li>
<li id="T0090.002text" style="display:none">T0090.002: Create Cyborg Accounts</li>
<li id="T0099.001text" style="display:none">T0099.001: Astroturfing</li>
<li id="T0119text" style="display:none">T0119: Cross-Posting</li>
<li id="T0099.003text" style="display:none">T0099.003: Impersonate Existing Organisation</li>
<li id="T0049.008text" style="display:none">T0049.008: Generate Information Pollution</li>
<li id="T0123.003text" style="display:none">T0123.003: Destroy Information Generation Capabilities</li>
<li id="T0135.002text" style="display:none">T0135.002: Thwart</li>
<li id="T0084.003text" style="display:none">T0084.003: Deceptively Labelled or Translated</li>
<li id="T0085.001text" style="display:none">T0085.001: Develop AI-Generated Text</li>
<li id="T0104.003text" style="display:none">T0104.003: Private/Closed Social Networks</li>
<li id="T0127.001text" style="display:none">T0127.001: Conduct Physical Violence</li>
<li id="T0129.002text" style="display:none">T0129.002: Generate Content Unrelated to Narrative</li>
<li id="T0134text" style="display:none">T0134: Measure Effectiveness Indicators (or KPIs)</li>
<li id="T0080.004text" style="display:none">T0080.004: Conduct Web Traffic Analysis</li>
<li id="T0090.003text" style="display:none">T0090.003: Create Bot Accounts</li>
<li id="T0099.002text" style="display:none">T0099.002: Spoof/Parody Account/Site</li>
<li id="T0119.001text" style="display:none">T0119.001: Post across Groups</li>
<li id="T0099.004text" style="display:none">T0099.004: Impersonate Existing Media Outlet</li>
<li id="T0118text" style="display:none">T0118: Amplify Existing Narrative</li>
<li id="T0123.004text" style="display:none">T0123.004: Conduct Server Redirect</li>
<li id="T0135.003text" style="display:none">T0135.003: Subvert</li>
<li id="T0084.004text" style="display:none">T0084.004: Appropriate Content</li>
<li id="T0085.003text" style="display:none">T0085.003: Develop Inauthentic News Articles</li>
<li id="T0104.004text" style="display:none">T0104.004: Interest-Based Networks</li>
<li id="T0127.002text" style="display:none">T0127.002: Encourage Physical Violence</li>
<li id="T0129.003text" style="display:none">T0129.003: Break Association with Content</li>
<li id="T0134.001text" style="display:none">T0134.001: Message Reach</li>
<li id="T0080.005text" style="display:none">T0080.005: Assess Degree/Type of Media Access</li>
<li id="T0090.004text" style="display:none">T0090.004: Create Sockpuppet Accounts</li>
<li id="T0100text" style="display:none">T0100: Co-Opt Trusted Sources</li>
<li id="T0119.002text" style="display:none">T0119.002: Post across Platform</li>
<li id="T0099.005text" style="display:none">T0099.005: Impersonate Existing Official</li>
<li id="T0119text" style="display:none">T0119: Cross-Posting</li>
<li id="T0124text" style="display:none">T0124: Suppress Opposition</li>
<li id="T0135.004text" style="display:none">T0135.004: Polarise</li>
<li id="T0085text" style="display:none">T0085: Develop Text-Based Content</li>
<li id="T0085.004text" style="display:none">T0085.004: Develop Document</li>
<li id="T0104.005text" style="display:none">T0104.005: Use Hashtags</li>
<li id="T0129.004text" style="display:none">T0129.004: Delete URLs</li>
<li id="T0134.002text" style="display:none">T0134.002: Social Media Engagement</li>
<li id="T0081text" style="display:none">T0081: Identify Social and Technical Vulnerabilities</li>
<li id="T0091text" style="display:none">T0091: Recruit Malign Actors</li>
<li id="T0100.001text" style="display:none">T0100.001: Co-Opt Trusted Individuals</li>
<li id="T0119.003text" style="display:none">T0119.003: Post across Disciplines</li>
<li id="T0099.006text" style="display:none">T0099.006: Impersonate Existing Influencer</li>
<li id="T0119.001text" style="display:none">T0119.001: Post across Groups</li>
<li id="T0124.001text" style="display:none">T0124.001: Report Non-Violative Opposing Content</li>
<li id="T0136text" style="display:none">T0136: Cultivate Support</li>
<li id="T0085.001text" style="display:none">T0085.001: Develop AI-Generated Text</li>
<li id="T0085.005text" style="display:none">T0085.005: Develop Book</li>
<li id="T0104.006text" style="display:none">T0104.006: Create Dedicated Hashtag</li>
<li id="T0129.005text" style="display:none">T0129.005: Coordinate on Encrypted/Closed Networks</li>
<li id="T0081.001text" style="display:none">T0081.001: Find Echo Chambers</li>
<li id="T0091.001text" style="display:none">T0091.001: Recruit Contractors</li>
<li id="T0100.002text" style="display:none">T0100.002: Co-Opt Grassroots Groups</li>
<li id="T0120text" style="display:none">T0120: Incentivize Sharing</li>
<li id="T0100text" style="display:none">T0100: Co-Opt Trusted Sources</li>
<li id="T0119.002text" style="display:none">T0119.002: Post across Platform</li>
<li id="T0124.002text" style="display:none">T0124.002: Goad People into Harmful Action (Stop Hitting Yourself)</li>
<li id="T0136.001text" style="display:none">T0136.001: Defend Reputaton</li>
<li id="T0085.002text" style="display:none">T0085.002: Develop False or Altered Documents</li>
<li id="T0085.006text" style="display:none">T0085.006: Develop Opinion Article</li>
<li id="T0105text" style="display:none">T0105: Media Sharing Networks</li>
<li id="T0129.006text" style="display:none">T0129.006: Deny Involvement</li>
<li id="T0081.002text" style="display:none">T0081.002: Identify Data Voids</li>
<li id="T0091.002text" style="display:none">T0091.002: Recruit Partisans</li>
<li id="T0100.003text" style="display:none">T0100.003: Co-Opt Influencers</li>
<li id="T0120.001text" style="display:none">T0120.001: Use Affiliate Marketing Programmes</li>
<li id="T0100.001text" style="display:none">T0100.001: Co-Opt Trusted Individuals</li>
<li id="T0119.003text" style="display:none">T0119.003: Post across Disciplines</li>
<li id="T0124.003text" style="display:none">T0124.003: Exploit Platform TOS/Content Moderation</li>
<li id="T0136.002text" style="display:none">T0136.002: Justify Action</li>
<li id="T0085.003text" style="display:none">T0085.003: Develop Inauthentic News Articles</li>
<li id="T0085.007text" style="display:none">T0085.007: Create Fake Research</li>
<li id="T0105.001text" style="display:none">T0105.001: Photo Sharing</li>
<li id="T0129.007text" style="display:none">T0129.007: Delete Accounts/Account Activity</li>
<li id="T0081.003text" style="display:none">T0081.003: Identify Existing Prejudices</li>
<li id="T0091.003text" style="display:none">T0091.003: Enlist Troll Accounts</li>
<li id="T0120.002text" style="display:none">T0120.002: Use Contests and Prizes</li>
<li id="T0100.002text" style="display:none">T0100.002: Co-Opt Grassroots Groups</li>
<li id="T0120text" style="display:none">T0120: Incentivize Sharing</li>
<li id="T0125text" style="display:none">T0125: Platform Filtering</li>
<li id="T0136.003text" style="display:none">T0136.003: Energise Supporters</li>
<li id="T0086text" style="display:none">T0086: Develop Image-Based Content</li>
@ -1015,33 +1014,37 @@ function handleTechniqueClick(box) {
<li id="T0129.008text" style="display:none">T0129.008: Redirect URLs</li>
<li id="T0081.004text" style="display:none">T0081.004: Identify Existing Fissures</li>
<li id="T0092text" style="display:none">T0092: Build Network</li>
<li id="T0121text" style="display:none">T0121: Manipulate Platform Algorithm</li>
<li id="T0100.003text" style="display:none">T0100.003: Co-Opt Influencers</li>
<li id="T0120.001text" style="display:none">T0120.001: Use Affiliate Marketing Programmes</li>
<li id="T0136.004text" style="display:none">T0136.004: Boost Reputation</li>
<li id="T0086.001text" style="display:none">T0086.001: Develop Memes</li>
<li id="T0105.003text" style="display:none">T0105.003: Audio Sharing</li>
<li id="T0129.009text" style="display:none">T0129.009: Remove Post Origins</li>
<li id="T0081.005text" style="display:none">T0081.005: Identify Existing Conspiracy Narratives/Suspicions</li>
<li id="T0092.001text" style="display:none">T0092.001: Create Organisations</li>
<li id="T0121.001text" style="display:none">T0121.001: Bypass Content Blocking</li>
<li id="T0142text" style="display:none">T0142: Fabricate Grassroots Movement</li>
<li id="T0120.002text" style="display:none">T0120.002: Use Contests and Prizes</li>
<li id="T0136.005text" style="display:none">T0136.005: Cultvate Support for Initiative</li>
<li id="T0086.002text" style="display:none">T0086.002: Develop AI-Generated Images (Deepfakes)</li>
<li id="T0106text" style="display:none">T0106: Discussion Forums</li>
<li id="T0129.010text" style="display:none">T0129.010: Misattribute Activity</li>
<li id="T0081.006text" style="display:none">T0081.006: Identify Wedge Issues</li>
<li id="T0092.002text" style="display:none">T0092.002: Use Follow Trains</li>
<li id="T0122text" style="display:none">T0122: Direct Users to Alternative Platforms</li>
<li id="T0121text" style="display:none">T0121: Manipulate Platform Algorithm</li>
<li id="T0136.006text" style="display:none">T0136.006: Cultivate Support for Ally</li>
<li id="T0086.003text" style="display:none">T0086.003: Deceptively Edit Images (Cheap Fakes)</li>
<li id="T0106.001text" style="display:none">T0106.001: Anonymous Message Boards</li>
<li id="T0130text" style="display:none">T0130: Conceal Infrastructure</li>
<li id="T0081.007text" style="display:none">T0081.007: Identify Target Audience Adversaries</li>
<li id="T0092.003text" style="display:none">T0092.003: Create Community or Sub-Group</li>
<li id="T0121.001text" style="display:none">T0121.001: Bypass Content Blocking</li>
<li id="T0136.007text" style="display:none">T0136.007: Recruit Members</li>
<li id="T0086.004text" style="display:none">T0086.004: Aggregate Information into Evidence Collages</li>
<li id="T0107text" style="display:none">T0107: Bookmarking and Content Curation</li>
<li id="T0130.001text" style="display:none">T0130.001: Conceal Sponsorship</li>
<li id="T0081.008text" style="display:none">T0081.008: Identify Media System Vulnerabilities</li>
<li id="T0093text" style="display:none">T0093: Acquire/Recruit Network</li>
<li id="T0122text" style="display:none">T0122: Direct Users to Alternative Platforms</li>
<li id="T0136.008text" style="display:none">T0136.008: Increase Prestige</li>
<li id="T0087text" style="display:none">T0087: Develop Video-Based Content</li>
<li id="T0108text" style="display:none">T0108: Blogging and Publishing Networks</li>
@ -1082,13 +1085,16 @@ function handleTechniqueClick(box) {
<li id="T0112text" style="display:none">T0112: Email</li>
<li id="T0096.001text" style="display:none">T0096.001: Create Content Farms</li>
<li id="T0138text" style="display:none">T0138: Motivate to Act</li>
<li id="T0089.002text" style="display:none">T0089.002: Create Inauthentic Documents</li>
<li id="T0089.003text" style="display:none">T0089.003: Alter Authentic Documents</li>
<li id="T0096.002text" style="display:none">T0096.002: Outsource Content Creation to External Organisations</li>
<li id="T0138.001text" style="display:none">T0138.001: Encourage</li>
<li id="T0089.003text" style="display:none">T0089.003: Alter Authentic Documents</li>
<li id="T0113text" style="display:none">T0113: Employ Commercial Analytic Firms</li>
<li id="T0138.002text" style="display:none">T0138.002: Provoke</li>
<li id="T0141text" style="display:none">T0141: Acquire Compromised Asset</li>
<li id="T0138.003text" style="display:none">T0138.003: Compel</li>
<li id="T0141.001text" style="display:none">T0141.001: Acquire Compromised Account</li>
<li id="T0139text" style="display:none">T0139: Dissuade from Acting</li>
<li id="T0141.002text" style="display:none">T0141.002: Acquire Compromised Website</li>
<li id="T0139.001text" style="display:none">T0139.001: Discourage</li>
<li id="T0139.002text" style="display:none">T0139.002: Silence</li>
<li id="T0139.003text" style="display:none">T0139.003: Deter</li>

View File

@ -1,26 +1,26 @@
P01,P01,P02,P02,P02,P03,P03,P03,P03,P04,P01,P02,P02,P02,P03,P03
TA01,TA02,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16,TA17,TA18
T0073,T0002,T0016,T0015,T0029,T0020,T0114,T0017,T0059,T0132,T0072,T0003,T0007,T0009,T0049,T0047
T0074,T0066,T0018,T0019,T0043,T0039,T0114.001,T0017.001,T0060,T0132.001,T0072.001,T0004,T0010,T0009.001,T0049.001,T0048
T0074.001,T0075,T0101,T0019.001,T0043.001,T0042,T0114.002,T0057,T0128,T0132.002,T0072.002,T0022,T0013,T0011,T0049.002,T0048.001
T0074.002,T0075.001,T0102,T0019.002,T0043.002,T0044,T0115,T0057.001,T0128.001,T0132.003,T0072.003,T0022.001,T0014,T0097,T0049.003,T0048.002
T0074.003,T0076,T0102.001,T0023,T0103,T0045,T0115.001,T0057.002,T0128.002,T0133,T0072.004,T0022.002,T0014.001,T0097.001,T0049.004,T0048.003
T0074.004,T0077,T0102.002,T0023.001,T0103.001,T0046,T0115.002,T0061,T0128.003,T0133.001,T0072.005,T0040,T0014.002,T0098,T0049.005,T0048.004
,T0078,T0102.003,T0023.002,T0103.002,T0113,T0115.003,T0126,T0128.004,T0133.002,T0080,T0068,T0065,T0098.001,T0049.006,T0123
,T0079,,T0084,T0104,,T0116,T0126.001,T0128.005,T0133.003,T0080.001,T0082,T0090,T0098.002,T0049.007,T0123.001
,T0135,,T0084.001,T0104.001,,T0116.001,T0126.002,T0129,T0133.004,T0080.002,T0083,T0090.001,T0099,T0118,T0123.002
,T0135.001,,T0084.002,T0104.002,,T0117,T0127,T0129.001,T0133.005,T0080.003,,T0090.002,T0099.001,T0119,T0123.003
,T0135.002,,T0084.003,T0104.003,,,T0127.001,T0129.002,T0134,T0080.004,,T0090.003,T0099.002,T0119.001,T0123.004
,T0135.003,,T0084.004,T0104.004,,,T0127.002,T0129.003,T0134.001,T0080.005,,T0090.004,T0100,T0119.002,T0124
,T0135.004,,T0085,T0104.005,,,,T0129.004,T0134.002,T0081,,T0091,T0100.001,T0119.003,T0124.001
,T0136,,T0085.001,T0104.006,,,,T0129.005,,T0081.001,,T0091.001,T0100.002,T0120,T0124.002
,T0136.001,,T0085.002,T0105,,,,T0129.006,,T0081.002,,T0091.002,T0100.003,T0120.001,T0124.003
,T0136.002,,T0085.003,T0105.001,,,,T0129.007,,T0081.003,,T0091.003,,T0120.002,T0125
,T0136.003,,T0086,T0105.002,,,,T0129.008,,T0081.004,,T0092,,T0121,
,T0136.004,,T0086.001,T0105.003,,,,T0129.009,,T0081.005,,T0092.001,,T0121.001,
,T0136.005,,T0086.002,T0106,,,,T0129.010,,T0081.006,,T0092.002,,T0122,
,T0136.006,,T0086.003,T0106.001,,,,T0130,,T0081.007,,T0092.003,,,
,T0136.007,,T0086.004,T0107,,,,T0130.001,,T0081.008,,T0093,,,
T0073,T0002,T0016,T0015,T0029,T0020,T0114,T0017,T0059,T0132,T0072,T0003,T0007,T0009,T0039,T0047
T0074,T0066,T0018,T0023,T0043,T0042,T0114.001,T0017.001,T0060,T0132.001,T0072.001,T0004,T0010,T0009.001,T0049,T0048
T0074.001,T0075,T0101,T0023.001,T0043.001,T0044,T0114.002,T0057,T0128,T0132.002,T0072.002,T0022,T0013,T0097,T0049.001,T0048.001
T0074.002,T0075.001,T0102,T0023.002,T0043.002,T0045,T0115,T0057.001,T0128.001,T0132.003,T0072.003,T0022.001,T0014,T0097.001,T0049.002,T0048.002
T0074.003,T0076,T0102.001,T0084,T0103,T0046,T0115.001,T0057.002,T0128.002,T0133,T0072.004,T0022.002,T0014.001,T0098,T0049.003,T0048.003
T0074.004,T0077,T0102.002,T0084.001,T0103.001,,T0115.002,T0061,T0128.003,T0133.001,T0072.005,T0040,T0014.002,T0098.001,T0049.004,T0048.004
,T0078,T0102.003,T0084.002,T0103.002,,T0115.003,T0126,T0128.004,T0133.002,T0080,T0068,T0065,T0098.002,T0049.005,T0123
,T0079,,T0084.003,T0104,,T0116,T0126.001,T0128.005,T0133.003,T0080.001,T0082,T0090,T0099,T0049.006,T0123.001
,T0135,,T0084.004,T0104.001,,T0116.001,T0126.002,T0129,T0133.004,T0080.002,T0083,T0090.001,T0099.002,T0049.007,T0123.002
,T0135.001,,T0085,T0104.002,,T0117,T0127,T0129.001,T0133.005,T0080.003,,T0090.002,T0099.003,T0049.008,T0123.003
,T0135.002,,T0085.001,T0104.003,,,T0127.001,T0129.002,T0134,T0080.004,,T0090.003,T0099.004,T0118,T0123.004
,T0135.003,,T0085.003,T0104.004,,,T0127.002,T0129.003,T0134.001,T0080.005,,T0090.004,T0099.005,T0119,T0124
,T0135.004,,T0085.004,T0104.005,,,,T0129.004,T0134.002,T0081,,T0091,T0099.006,T0119.001,T0124.001
,T0136,,T0085.005,T0104.006,,,,T0129.005,,T0081.001,,T0091.001,T0100,T0119.002,T0124.002
,T0136.001,,T0085.006,T0105,,,,T0129.006,,T0081.002,,T0091.002,T0100.001,T0119.003,T0124.003
,T0136.002,,T0085.007,T0105.001,,,,T0129.007,,T0081.003,,T0091.003,T0100.002,T0120,T0125
,T0136.003,,T0086,T0105.002,,,,T0129.008,,T0081.004,,T0092,T0100.003,T0120.001,
,T0136.004,,T0086.001,T0105.003,,,,T0129.009,,T0081.005,,T0092.001,T0142,T0120.002,
,T0136.005,,T0086.002,T0106,,,,T0129.010,,T0081.006,,T0092.002,,T0121,
,T0136.006,,T0086.003,T0106.001,,,,T0130,,T0081.007,,T0092.003,,T0121.001,
,T0136.007,,T0086.004,T0107,,,,T0130.001,,T0081.008,,T0093,,T0122,
,T0136.008,,T0087,T0108,,,,T0130.002,,,,T0093.001,,,
,T0137,,T0087.001,T0109,,,,T0130.003,,,,T0093.002,,,
,T0137.001,,T0087.002,T0110,,,,T0130.004,,,,T0094,,,
@ -29,11 +29,11 @@ T0074.004,T0077,T0102.002,T0023.001,T0103.001,T0046,T0115.002,T0061,T0128.003,T0
,T0137.004,,T0088.002,T0111.002,,,,T0131.001,,,,T0095,,,
,T0137.005,,T0089,T0111.003,,,,T0131.002,,,,T0096,,,
,T0137.006,,T0089.001,T0112,,,,,,,,T0096.001,,,
,T0138,,T0089.002,,,,,,,,,T0096.002,,,
,T0138.001,,T0089.003,,,,,,,,,,,,
,T0138.002,,,,,,,,,,,,,,
,T0138.003,,,,,,,,,,,,,,
,T0139,,,,,,,,,,,,,,
,T0138,,T0089.003,,,,,,,,,T0096.002,,,
,T0138.001,,,,,,,,,,,T0113,,,
,T0138.002,,,,,,,,,,,T0141,,,
,T0138.003,,,,,,,,,,,T0141.001,,,
,T0139,,,,,,,,,,,T0141.002,,,
,T0139.001,,,,,,,,,,,,,,
,T0139.002,,,,,,,,,,,,,,
,T0139.003,,,,,,,,,,,,,,

1 P01 P01 P02 P02 P02 P03 P03 P03 P03 P04 P01 P02 P02 P02 P03 P03
2 TA01 TA02 TA05 TA06 TA07 TA08 TA09 TA10 TA11 TA12 TA13 TA14 TA15 TA16 TA17 TA18
3 T0073 T0002 T0016 T0015 T0029 T0020 T0114 T0017 T0059 T0132 T0072 T0003 T0007 T0009 T0049 T0039 T0047
4 T0074 T0066 T0018 T0019 T0023 T0043 T0039 T0042 T0114.001 T0017.001 T0060 T0132.001 T0072.001 T0004 T0010 T0009.001 T0049.001 T0049 T0048
5 T0074.001 T0075 T0101 T0019.001 T0023.001 T0043.001 T0042 T0044 T0114.002 T0057 T0128 T0132.002 T0072.002 T0022 T0013 T0011 T0097 T0049.002 T0049.001 T0048.001
6 T0074.002 T0075.001 T0102 T0019.002 T0023.002 T0043.002 T0044 T0045 T0115 T0057.001 T0128.001 T0132.003 T0072.003 T0022.001 T0014 T0097 T0097.001 T0049.003 T0049.002 T0048.002
7 T0074.003 T0076 T0102.001 T0023 T0084 T0103 T0045 T0046 T0115.001 T0057.002 T0128.002 T0133 T0072.004 T0022.002 T0014.001 T0097.001 T0098 T0049.004 T0049.003 T0048.003
8 T0074.004 T0077 T0102.002 T0023.001 T0084.001 T0103.001 T0046 T0115.002 T0061 T0128.003 T0133.001 T0072.005 T0040 T0014.002 T0098 T0098.001 T0049.005 T0049.004 T0048.004
9 T0078 T0102.003 T0023.002 T0084.002 T0103.002 T0113 T0115.003 T0126 T0128.004 T0133.002 T0080 T0068 T0065 T0098.001 T0098.002 T0049.006 T0049.005 T0123
10 T0079 T0084 T0084.003 T0104 T0116 T0126.001 T0128.005 T0133.003 T0080.001 T0082 T0090 T0098.002 T0099 T0049.007 T0049.006 T0123.001
11 T0135 T0084.001 T0084.004 T0104.001 T0116.001 T0126.002 T0129 T0133.004 T0080.002 T0083 T0090.001 T0099 T0099.002 T0118 T0049.007 T0123.002
12 T0135.001 T0084.002 T0085 T0104.002 T0117 T0127 T0129.001 T0133.005 T0080.003 T0090.002 T0099.001 T0099.003 T0119 T0049.008 T0123.003
13 T0135.002 T0084.003 T0085.001 T0104.003 T0127.001 T0129.002 T0134 T0080.004 T0090.003 T0099.002 T0099.004 T0119.001 T0118 T0123.004
14 T0135.003 T0084.004 T0085.003 T0104.004 T0127.002 T0129.003 T0134.001 T0080.005 T0090.004 T0100 T0099.005 T0119.002 T0119 T0124
15 T0135.004 T0085 T0085.004 T0104.005 T0129.004 T0134.002 T0081 T0091 T0100.001 T0099.006 T0119.003 T0119.001 T0124.001
16 T0136 T0085.001 T0085.005 T0104.006 T0129.005 T0081.001 T0091.001 T0100.002 T0100 T0120 T0119.002 T0124.002
17 T0136.001 T0085.002 T0085.006 T0105 T0129.006 T0081.002 T0091.002 T0100.003 T0100.001 T0120.001 T0119.003 T0124.003
18 T0136.002 T0085.003 T0085.007 T0105.001 T0129.007 T0081.003 T0091.003 T0100.002 T0120.002 T0120 T0125
19 T0136.003 T0086 T0105.002 T0129.008 T0081.004 T0092 T0100.003 T0121 T0120.001
20 T0136.004 T0086.001 T0105.003 T0129.009 T0081.005 T0092.001 T0142 T0121.001 T0120.002
21 T0136.005 T0086.002 T0106 T0129.010 T0081.006 T0092.002 T0122 T0121
22 T0136.006 T0086.003 T0106.001 T0130 T0081.007 T0092.003 T0121.001
23 T0136.007 T0086.004 T0107 T0130.001 T0081.008 T0093 T0122
24 T0136.008 T0087 T0108 T0130.002 T0093.001
25 T0137 T0087.001 T0109 T0130.003 T0093.002
26 T0137.001 T0087.002 T0110 T0130.004 T0094
29 T0137.004 T0088.002 T0111.002 T0131.001 T0095
30 T0137.005 T0089 T0111.003 T0131.002 T0096
31 T0137.006 T0089.001 T0112 T0096.001
32 T0138 T0089.002 T0089.003 T0096.002
33 T0138.001 T0089.003 T0113
34 T0138.002 T0141
35 T0138.003 T0141.001
36 T0139 T0141.002
37 T0139.001
38 T0139.002
39 T0139.003

View File

@ -26,7 +26,6 @@
| Counters these Techniques |
| ------------------------- |
| [T0011 Compromise Legitimate Accounts](../../generated_pages/techniques/T0011.md) |

View File

@ -23,7 +23,6 @@
| Counters these Techniques |
| ------------------------- |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) |

View File

@ -23,7 +23,6 @@
| Counters these Techniques |
| ------------------------- |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) |

View File

@ -25,7 +25,6 @@
| Counters these Techniques |
| ------------------------- |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) |

View File

@ -23,7 +23,7 @@
| Counters these Techniques |
| ------------------------- |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) |

View File

@ -24,7 +24,7 @@
| Counters these Techniques |
| ------------------------- |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) |

View File

@ -24,7 +24,7 @@
| Counters these Techniques |
| ------------------------- |
| [T0049 Flooding the Information Space](../../generated_pages/techniques/T0049.md) |
| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) |

View File

@ -24,7 +24,7 @@
| Counters these Techniques |
| ------------------------- |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) |

View File

@ -25,7 +25,7 @@
| Counters these Techniques |
| ------------------------- |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) |

View File

@ -24,7 +24,6 @@
| Counters these Techniques |
| ------------------------- |
| [T0011 Compromise Legitimate Accounts](../../generated_pages/techniques/T0011.md) |

View File

@ -182,7 +182,7 @@
<td>Create more friction at account creation</td>
<td>Counters fake account</td>
<td>M004 - Friction</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D04</td>
</tr>
<tr>
@ -190,7 +190,7 @@
<td>Infiltrate the in-group to discredit leaders (divide)</td>
<td>All of these would be highly affected by infiltration or false-claims of infiltration.</td>
<td>M013 - Targeting</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -198,7 +198,7 @@
<td>third party verification for people</td>
<td>counters fake experts</td>
<td>M011 - Verification</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -206,7 +206,7 @@
<td>Address truth contained in narratives</td>
<td>Focus on and boost truths in misinformation narratives, removing misinformation from them.</td>
<td>M010 - Countermessaging</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D04</td>
</tr>
<tr>
@ -214,7 +214,7 @@
<td>Keep people from posting to social media immediately</td>
<td>Platforms can introduce friction to slow down activities, force a small delay between posts, or replies to posts.</td>
<td>M004 - Friction</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D03</td>
</tr>
<tr>
@ -222,7 +222,7 @@
<td>Marginalise and discredit extremist groups</td>
<td>Reduce the credibility of extremist groups posting misinformation.</td>
<td>M013 - Targeting</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D04</td>
</tr>
<tr>
@ -230,7 +230,7 @@
<td>Honeypot with coordinated inauthentics</td>
<td>Flood disinformation spaces with obviously fake content, to dilute core misinformation narratives in them.</td>
<td>M008 - Data Pollution</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D05</td>
</tr>
<tr>
@ -238,7 +238,7 @@
<td>Name and Shame Influencers</td>
<td>Think about the different levels: individual vs state-sponsored account. Includes “call them out” and “name and shame”. Identify social media accounts as sources of propaganda—“calling them out”— might be helpful to prevent the spread of their message to audiences that otherwise would consider them factual. Identify, monitor, and, if necessary, target externally-based nonattributed social media accounts. Impact of and Dealing with Trolls - "Chatham House has observed that trolls also sometimes function as decoys, as a way of “keeping the infantry busy” that “aims to wear down the other side” (Lough et al., 2014). Another type of troll involves “false accounts posing as authoritative information sources on social media”.</td>
<td>M003 - Daylight</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D07</td>
</tr>
<tr>
@ -246,7 +246,7 @@
<td>Counter social engineering training</td>
<td>Includes anti-elicitation training, phishing prevention education.</td>
<td>M001 - Resilience</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -254,7 +254,7 @@
<td>Infiltrate platforms</td>
<td>Detect and degrade</td>
<td>M013 - Targeting</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D04</td>
</tr>
<tr>
@ -262,7 +262,7 @@
<td>Delete old accounts / Remove unused social media accounts</td>
<td>remove or remove access to (e.g. stop the ability to update) old social media accounts, to reduce the pool of accounts available for takeover, botnets etc.</td>
<td>M012 - Cleaning</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D04</td>
</tr>
<tr>
@ -270,7 +270,7 @@
<td>Encourage people to leave social media</td>
<td>Encourage people to leave spcial media. We don't expect this to work</td>
<td>M004 - Friction</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -278,7 +278,7 @@
<td>Report crowdfunder as violator</td>
<td>counters crowdfunding. Includes Expose online funding as fake”.</td>
<td>M005 - Removal</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -286,7 +286,7 @@
<td>Verification of project before posting fund requests</td>
<td>third-party verification of projects posting funding campaigns before those campaigns can be posted.</td>
<td>M011 - Verification</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -302,7 +302,7 @@
<td>Free open library sources worldwide</td>
<td>Open-source libraries could be created that aid in some way for each technique. Even for Strategic Planning, some open-source frameworks such as DISARM can be created to counter the adversarial efforts.</td>
<td>M010 - Countermessaging</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D04</td>
</tr>
<tr>
@ -326,7 +326,7 @@
<td>Denigrate the recipient/ project (of online funding)</td>
<td>Reduce the credibility of groups behind misinformation-linked funding campaigns.</td>
<td>M013 - Targeting</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D03</td>
</tr>
<tr>
@ -390,7 +390,7 @@
<td>Active defence: run TA15 "develop people” - not recommended</td>
<td>Develop networks of communities and influencers around counter-misinformation. Match them to misinformation creators</td>
<td>M013 - Targeting</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D03</td>
</tr>
<tr>
@ -486,7 +486,7 @@
<td>Influencer code of conduct</td>
<td>Establish tailored code of conduct for individuals with many followers. Can be platform code of conduct; can also be community code.</td>
<td>M001 - Resilience</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D07</td>
</tr>
<tr>
@ -750,7 +750,7 @@
<td>Deplatform Account*</td>
<td>Note: Similar to Deplatform People but less generic. Perhaps both should be left.</td>
<td>M005 - Removal</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D03</td>
</tr>
<tr>
@ -758,7 +758,7 @@
<td>Deplatform message groups and/or message boards</td>
<td>Merged two rows here.</td>
<td>M005 - Removal</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D03</td>
</tr>
<tr>
@ -862,7 +862,7 @@
<td>Ban incident actors from funding sites</td>
<td>Ban misinformation creators and posters from funding sites</td>
<td>M005 - Removal</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -886,7 +886,7 @@
<td>find and train influencers</td>
<td>Identify key influencers (e.g. use network analysis), then reach out to identified users and offer support, through either training or resources.</td>
<td>M001 - Resilience</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -902,7 +902,7 @@
<td>Unravel/target the Potemkin villages</td>
<td>Kremlins narrative spin extends through constellations of “civil society” organisations, political parties, churches, and other actors. Moscow leverages think tanks, human rights groups, election observers, Eurasianist integration groups, and orthodox groups. A collection of Russian civil society organisations, such as the Federal Agency for the Commonwealth of Independent States Affairs, Compatriots Living Abroad, and International Humanitarian Cooperation, together receive at least US$100 million per year, in addition to government-organized nongovernmental organisations (NGOs), at least 150 of which are funded by Russian presidential grants totaling US$70 million per year.</td>
<td>M013 - Targeting</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D03</td>
</tr>
<tr>
@ -942,7 +942,7 @@
<td>social media source removal</td>
<td>Removing accounts, pages, groups, e.g. facebook page removal</td>
<td>M005 - Removal</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -998,7 +998,7 @@
<td>Ensure that platforms are taking down flagged accounts</td>
<td>Use ongoing analysis/monitoring of "flagged" profiles. Confirm whether platforms are actively removing flagged accounts, and raise pressure via e.g. government organisations to encourage removal</td>
<td>M003 - Daylight</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D06</td>
</tr>
<tr>
@ -1022,7 +1022,7 @@
<td>remove suspicious accounts</td>
<td>Standard reporting for false profiles (identity issues). Includes detecting hijacked accounts and reallocating them - if possible, back to original owners.</td>
<td>M005 - Removal</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D02</td>
</tr>
<tr>
@ -1046,7 +1046,7 @@
<td>Stop offering press credentials to propaganda outlets</td>
<td>Remove access to official press events from known misinformation actors.</td>
<td>M004 - Friction</td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D03</td>
</tr>
<tr>

View File

@ -70,7 +70,7 @@
<td>Detect abnormal amplification</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -78,7 +78,7 @@
<td>Detect abnormal events</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -86,7 +86,7 @@
<td>Detect abnormal groups</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -94,7 +94,7 @@
<td>Detect abnormal pages</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -102,7 +102,7 @@
<td>Detect abnormal profiles, e.g. prolific pages/ groups/ people</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -110,7 +110,7 @@
<td>Identify fake news sites</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -118,7 +118,7 @@
<td>Trace connections</td>
<td>for e.g. fake news sites</td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -126,7 +126,7 @@
<td>Detect anomalies in membership growth patterns</td>
<td>I include Fake Experts as they may use funding campaigns such as Patreon to fund their operations and so these should be watched.</td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -134,7 +134,7 @@
<td>Identify fence-sitters</td>
<td>Note: In each case, depending on the platform there may be a way to identify a fence-sitter. For example, online polls may have a neutral option or a "somewhat this-or-that" option, and may reveal who voted for that to all visitors. This information could be of use to data analysts. In TA08-11, the engagement level of victims could be identified to detect and respond to increasing engagement.</td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -142,7 +142,7 @@
<td>Measure emotional valence</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -150,7 +150,7 @@
<td>Follow the money</td>
<td>track funding sources</td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -158,7 +158,7 @@
<td>Activity resurgence detection (alarm when dormant accounts become activated)</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -166,7 +166,7 @@
<td>Detect anomalous activity</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -174,7 +174,7 @@
<td>AI/ML automated early detection of campaign planning</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -182,7 +182,7 @@
<td>Digital authority - regulating body (united states)</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -190,7 +190,7 @@
<td>Periodic verification (counter to hijack legitimate account)</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -198,7 +198,7 @@
<td>Teach civics to kids/ adults/ seniors</td>
<td></td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -622,7 +622,7 @@
<td>Model for bot account behaviour</td>
<td>Bot account: action based, people. Unsure which DISARM techniques.</td>
<td></td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -630,7 +630,7 @@
<td>Monitor account level activity in social networks</td>
<td>All techniques benefit from careful analysis and monitoring of activities on social network.</td>
<td></td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -678,7 +678,7 @@
<td>Track individual bad actors</td>
<td></td>
<td></td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -718,7 +718,7 @@
<td>target/name/flag "grey zone" website content</td>
<td>"Grey zone" is second level of content producers and circulators, composed of outlets with uncertain attribution. This category covers conspiracy websites, far-right or far-left websites, news aggregators, and data dump websites</td>
<td></td>
<td>TA15 Establish Social Assets</td>
<td>TA15 Establish Assets</td>
<td>D01</td>
</tr>
<tr>
@ -750,7 +750,7 @@
<td>S4d detection and re-allocation approaches</td>
<td>S4D is a way to separate out different speakers in text, audio.</td>
<td>M004 - Friction</td>
<td>TA15 - Establish Social Assets</td>
<td>TA15 - Establish Assets</td>
<td>D01</td>
</tr>
<tr>

View File

@ -15,7 +15,7 @@
<td><a href="tactics/TA12.md">TA12 Assess Effectiveness</a></td>
<td><a href="tactics/TA13.md">TA13 Target Audience Analysis</a></td>
<td><a href="tactics/TA14.md">TA14 Develop Narratives</a></td>
<td><a href="tactics/TA15.md">TA15 Establish Social Assets</a></td>
<td><a href="tactics/TA15.md">TA15 Establish Assets</a></td>
<td><a href="tactics/TA16.md">TA16 Establish Legitimacy</a></td>
<td><a href="tactics/TA17.md">TA17 Maximise Exposure</a></td>
<td><a href="tactics/TA18.md">TA18 Drive Online Harms</a></td>

View File

@ -15,7 +15,7 @@
<td><a href="tactics/TA12.md">TA12 Assess Effectiveness</a></td>
<td><a href="tactics/TA13.md">TA13 Target Audience Analysis</a></td>
<td><a href="tactics/TA14.md">TA14 Develop Narratives</a></td>
<td><a href="tactics/TA15.md">TA15 Establish Social Assets</a></td>
<td><a href="tactics/TA15.md">TA15 Establish Assets</a></td>
<td><a href="tactics/TA16.md">TA16 Establish Legitimacy</a></td>
<td><a href="tactics/TA17.md">TA17 Maximise Exposure</a></td>
<td><a href="tactics/TA18.md">TA18 Drive Online Harms</a></td>
@ -35,16 +35,16 @@
<td><a href="techniques/T0003.md">T0003 Leverage Existing Narratives</a></td>
<td><a href="techniques/T0007.md">T0007 Create Inauthentic Social Media Pages and Groups</a></td>
<td><a href="techniques/T0009.md">T0009 Create Fake Experts</a></td>
<td><a href="techniques/T0049.md">T0049 Flooding the Information Space</a></td>
<td><a href="techniques/T0039.md">T0039 Bait Influencer</a></td>
<td><a href="techniques/T0047.md">T0047 Censor Social Media as a Political Force</a></td>
</tr>
<tr>
<td><a href="techniques/T0074.md">T0074 Determine Strategic Ends</a></td>
<td><a href="techniques/T0066.md">T0066 Degrade Adversary</a></td>
<td><a href="techniques/T0018.md">T0018 Purchase Targeted Advertisements</a></td>
<td><a href="techniques/T0019.md">T0019 Generate Information Pollution</a></td>
<td><a href="techniques/T0023.md">T0023 Distort Facts</a></td>
<td><a href="techniques/T0043.md">T0043 Chat Apps</a></td>
<td><a href="techniques/T0039.md">T0039 Bait Legitimate Influencers</a></td>
<td><a href="techniques/T0042.md">T0042 Seed Kernel of Truth</a></td>
<td><a href="techniques/T0114.001.md">T0114.001 Social Media</a></td>
<td><a href="techniques/T0017.001.md">T0017.001 Conduct Crowdfunding Campaigns</a></td>
<td><a href="techniques/T0060.md">T0060 Continue to Amplify</a></td>
@ -53,16 +53,16 @@
<td><a href="techniques/T0004.md">T0004 Develop Competing Narratives</a></td>
<td><a href="techniques/T0010.md">T0010 Cultivate Ignorant Agents</a></td>
<td><a href="techniques/T0009.001.md">T0009.001 Utilise Academic/Pseudoscientific Justifications</a></td>
<td><a href="techniques/T0049.001.md">T0049.001 Trolls Amplify and Manipulate</a></td>
<td><a href="techniques/T0049.md">T0049 Flood Information Space</a></td>
<td><a href="techniques/T0048.md">T0048 Harass</a></td>
</tr>
<tr>
<td><a href="techniques/T0074.001.md">T0074.001 Geopolitical Advantage</a></td>
<td><a href="techniques/T0075.md">T0075 Dismiss</a></td>
<td><a href="techniques/T0101.md">T0101 Create Localised Content</a></td>
<td><a href="techniques/T0019.001.md">T0019.001 Create Fake Research</a></td>
<td><a href="techniques/T0023.001.md">T0023.001 Reframe Context</a></td>
<td><a href="techniques/T0043.001.md">T0043.001 Use Encrypted Chat Apps</a></td>
<td><a href="techniques/T0042.md">T0042 Seed Kernel of Truth</a></td>
<td><a href="techniques/T0044.md">T0044 Seed Distortions</a></td>
<td><a href="techniques/T0114.002.md">T0114.002 Traditional Media</a></td>
<td><a href="techniques/T0057.md">T0057 Organise Events</a></td>
<td><a href="techniques/T0128.md">T0128 Conceal Information Assets</a></td>
@ -70,17 +70,17 @@
<td><a href="techniques/T0072.002.md">T0072.002 Demographic Segmentation</a></td>
<td><a href="techniques/T0022.md">T0022 Leverage Conspiracy Theory Narratives</a></td>
<td><a href="techniques/T0013.md">T0013 Create Inauthentic Websites</a></td>
<td><a href="techniques/T0011.md">T0011 Compromise Legitimate Accounts</a></td>
<td><a href="techniques/T0049.002.md">T0049.002 Hijack Existing Hashtag</a></td>
<td><a href="techniques/T0097.md">T0097 Create Personas</a></td>
<td><a href="techniques/T0049.001.md">T0049.001 Trolls Amplify and Manipulate</a></td>
<td><a href="techniques/T0048.001.md">T0048.001 Boycott/"Cancel" Opponents</a></td>
</tr>
<tr>
<td><a href="techniques/T0074.002.md">T0074.002 Domestic Political Advantage</a></td>
<td><a href="techniques/T0075.001.md">T0075.001 Discredit Credible Sources</a></td>
<td><a href="techniques/T0102.md">T0102 Leverage Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0019.002.md">T0019.002 Hijack Hashtags</a></td>
<td><a href="techniques/T0023.002.md">T0023.002 Edit Open-Source Content</a></td>
<td><a href="techniques/T0043.002.md">T0043.002 Use Unencrypted Chats Apps</a></td>
<td><a href="techniques/T0044.md">T0044 Seed Distortions</a></td>
<td><a href="techniques/T0045.md">T0045 Use Fake Experts</a></td>
<td><a href="techniques/T0115.md">T0115 Post Content</a></td>
<td><a href="techniques/T0057.001.md">T0057.001 Pay for Physical Action</a></td>
<td><a href="techniques/T0128.001.md">T0128.001 Use Pseudonyms</a></td>
@ -88,17 +88,17 @@
<td><a href="techniques/T0072.003.md">T0072.003 Economic Segmentation</a></td>
<td><a href="techniques/T0022.001.md">T0022.001 Amplify Existing Conspiracy Theory Narratives</a></td>
<td><a href="techniques/T0014.md">T0014 Prepare Fundraising Campaigns</a></td>
<td><a href="techniques/T0097.md">T0097 Create Personas</a></td>
<td><a href="techniques/T0049.003.md">T0049.003 Bots Amplify via Automated Forwarding and Reposting</a></td>
<td><a href="techniques/T0097.001.md">T0097.001 Produce Evidence for Persona</a></td>
<td><a href="techniques/T0049.002.md">T0049.002 Flood Existing Hashtag</a></td>
<td><a href="techniques/T0048.002.md">T0048.002 Harass People Based on Identities</a></td>
</tr>
<tr>
<td><a href="techniques/T0074.003.md">T0074.003 Economic Advantage</a></td>
<td><a href="techniques/T0076.md">T0076 Distort</a></td>
<td><a href="techniques/T0102.001.md">T0102.001 Use Existing Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0023.md">T0023 Distort Facts</a></td>
<td><a href="techniques/T0084.md">T0084 Reuse Existing Content</a></td>
<td><a href="techniques/T0103.md">T0103 Livestream</a></td>
<td><a href="techniques/T0045.md">T0045 Use Fake Experts</a></td>
<td><a href="techniques/T0046.md">T0046 Use Search Engine Optimisation</a></td>
<td><a href="techniques/T0115.001.md">T0115.001 Share Memes</a></td>
<td><a href="techniques/T0057.002.md">T0057.002 Conduct Symbolic Action</a></td>
<td><a href="techniques/T0128.002.md">T0128.002 Conceal Network Identity</a></td>
@ -106,17 +106,17 @@
<td><a href="techniques/T0072.004.md">T0072.004 Psychographic Segmentation</a></td>
<td><a href="techniques/T0022.002.md">T0022.002 Develop Original Conspiracy Theory Narratives</a></td>
<td><a href="techniques/T0014.001.md">T0014.001 Raise Funds from Malign Actors</a></td>
<td><a href="techniques/T0097.001.md">T0097.001 Backstop Personas</a></td>
<td><a href="techniques/T0049.004.md">T0049.004 Utilise Spamoflauge</a></td>
<td><a href="techniques/T0098.md">T0098 Establish Inauthentic News Sites</a></td>
<td><a href="techniques/T0049.003.md">T0049.003 Bots Amplify via Automated Forwarding and Reposting</a></td>
<td><a href="techniques/T0048.003.md">T0048.003 Threaten to Dox</a></td>
</tr>
<tr>
<td><a href="techniques/T0074.004.md">T0074.004 Ideological Advantage</a></td>
<td><a href="techniques/T0077.md">T0077 Distract</a></td>
<td><a href="techniques/T0102.002.md">T0102.002 Create Echo Chambers/Filter Bubbles</a></td>
<td><a href="techniques/T0023.001.md">T0023.001 Reframe Context</a></td>
<td><a href="techniques/T0084.001.md">T0084.001 Use Copypasta</a></td>
<td><a href="techniques/T0103.001.md">T0103.001 Video Livestream</a></td>
<td><a href="techniques/T0046.md">T0046 Use Search Engine Optimisation</a></td>
<td> </td>
<td><a href="techniques/T0115.002.md">T0115.002 Post Violative Content to Provoke Takedown and Backlash</a></td>
<td><a href="techniques/T0061.md">T0061 Sell Merchandise</a></td>
<td><a href="techniques/T0128.003.md">T0128.003 Distance Reputable Individuals from Operation</a></td>
@ -124,17 +124,17 @@
<td><a href="techniques/T0072.005.md">T0072.005 Political Segmentation</a></td>
<td><a href="techniques/T0040.md">T0040 Demand Insurmountable Proof</a></td>
<td><a href="techniques/T0014.002.md">T0014.002 Raise Funds from Ignorant Agents</a></td>
<td><a href="techniques/T0098.md">T0098 Establish Inauthentic News Sites</a></td>
<td><a href="techniques/T0049.005.md">T0049.005 Conduct Swarming</a></td>
<td><a href="techniques/T0098.001.md">T0098.001 Create Inauthentic News Sites</a></td>
<td><a href="techniques/T0049.004.md">T0049.004 Utilise Spamoflauge</a></td>
<td><a href="techniques/T0048.004.md">T0048.004 Dox</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0078.md">T0078 Dismay</a></td>
<td><a href="techniques/T0102.003.md">T0102.003 Exploit Data Voids</a></td>
<td><a href="techniques/T0023.002.md">T0023.002 Edit Open-Source Content</a></td>
<td><a href="techniques/T0084.002.md">T0084.002 Plagiarise Content</a></td>
<td><a href="techniques/T0103.002.md">T0103.002 Audio Livestream</a></td>
<td><a href="techniques/T0113.md">T0113 Employ Commercial Analytic Firms</a></td>
<td> </td>
<td><a href="techniques/T0115.003.md">T0115.003 One-Way Direct Posting</a></td>
<td><a href="techniques/T0126.md">T0126 Encourage Attendance at Events</a></td>
<td><a href="techniques/T0128.004.md">T0128.004 Launder Information Assets</a></td>
@ -142,15 +142,15 @@
<td><a href="techniques/T0080.md">T0080 Map Target Audience Information Environment</a></td>
<td><a href="techniques/T0068.md">T0068 Respond to Breaking News Event or Active Crisis</a></td>
<td><a href="techniques/T0065.md">T0065 Prepare Physical Broadcast Capabilities</a></td>
<td><a href="techniques/T0098.001.md">T0098.001 Create Inauthentic News Sites</a></td>
<td><a href="techniques/T0049.006.md">T0049.006 Conduct Keyword Squatting</a></td>
<td><a href="techniques/T0098.002.md">T0098.002 Leverage Existing Inauthentic News Sites</a></td>
<td><a href="techniques/T0049.005.md">T0049.005 Conduct Swarming</a></td>
<td><a href="techniques/T0123.md">T0123 Control Information Environment through Offensive Cyberspace Operations</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0079.md">T0079 Divide</a></td>
<td> </td>
<td><a href="techniques/T0084.md">T0084 Reuse Existing Content</a></td>
<td><a href="techniques/T0084.003.md">T0084.003 Deceptively Labelled or Translated</a></td>
<td><a href="techniques/T0104.md">T0104 Social Networks</a></td>
<td> </td>
<td><a href="techniques/T0116.md">T0116 Comment or Reply on Content</a></td>
@ -160,15 +160,15 @@
<td><a href="techniques/T0080.001.md">T0080.001 Monitor Social Media Analytics</a></td>
<td><a href="techniques/T0082.md">T0082 Develop New Narratives</a></td>
<td><a href="techniques/T0090.md">T0090 Create Inauthentic Accounts</a></td>
<td><a href="techniques/T0098.002.md">T0098.002 Leverage Existing Inauthentic News Sites</a></td>
<td><a href="techniques/T0049.007.md">T0049.007 Inauthentic Sites Amplify News and Narratives</a></td>
<td><a href="techniques/T0099.md">T0099 Impersonate Existing Entity</a></td>
<td><a href="techniques/T0049.006.md">T0049.006 Conduct Keyword Squatting</a></td>
<td><a href="techniques/T0123.001.md">T0123.001 Delete Opposing Content</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0135.md">T0135 Undermine</a></td>
<td> </td>
<td><a href="techniques/T0084.001.md">T0084.001 Use Copypasta</a></td>
<td><a href="techniques/T0084.004.md">T0084.004 Appropriate Content</a></td>
<td><a href="techniques/T0104.001.md">T0104.001 Mainstream Social Networks</a></td>
<td> </td>
<td><a href="techniques/T0116.001.md">T0116.001 Post Inauthentic Social Media Comment</a></td>
@ -178,16 +178,16 @@
<td><a href="techniques/T0080.002.md">T0080.002 Evaluate Media Surveys</a></td>
<td><a href="techniques/T0083.md">T0083 Integrate Target Audience Vulnerabilities into Narrative</a></td>
<td><a href="techniques/T0090.001.md">T0090.001 Create Anonymous Accounts</a></td>
<td><a href="techniques/T0099.md">T0099 Prepare Assets Impersonating Legitimate Entities</a></td>
<td><a href="techniques/T0118.md">T0118 Amplify Existing Narrative</a></td>
<td><a href="techniques/T0099.002.md">T0099.002 Spoof/Parody Account/Site</a></td>
<td><a href="techniques/T0049.007.md">T0049.007 Inauthentic Sites Amplify News and Narratives</a></td>
<td><a href="techniques/T0123.002.md">T0123.002 Block Content</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0135.001.md">T0135.001 Smear</a></td>
<td> </td>
<td><a href="techniques/T0084.002.md">T0084.002 Plagiarise Content</a></td>
<td><a href="techniques/T0104.002.md">T0104.002 Dating Apps</a></td>
<td><a href="techniques/T0085.md">T0085 Develop Text-Based Content</a></td>
<td><a href="techniques/T0104.002.md">T0104.002 Dating App</a></td>
<td> </td>
<td><a href="techniques/T0117.md">T0117 Attract Traditional Media</a></td>
<td><a href="techniques/T0127.md">T0127 Physical Violence</a></td>
@ -196,15 +196,15 @@
<td><a href="techniques/T0080.003.md">T0080.003 Identify Trending Topics/Hashtags</a></td>
<td> </td>
<td><a href="techniques/T0090.002.md">T0090.002 Create Cyborg Accounts</a></td>
<td><a href="techniques/T0099.001.md">T0099.001 Astroturfing</a></td>
<td><a href="techniques/T0119.md">T0119 Cross-Posting</a></td>
<td><a href="techniques/T0099.003.md">T0099.003 Impersonate Existing Organisation</a></td>
<td><a href="techniques/T0049.008.md">T0049.008 Generate Information Pollution</a></td>
<td><a href="techniques/T0123.003.md">T0123.003 Destroy Information Generation Capabilities</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0135.002.md">T0135.002 Thwart</a></td>
<td> </td>
<td><a href="techniques/T0084.003.md">T0084.003 Deceptively Labelled or Translated</a></td>
<td><a href="techniques/T0085.001.md">T0085.001 Develop AI-Generated Text</a></td>
<td><a href="techniques/T0104.003.md">T0104.003 Private/Closed Social Networks</a></td>
<td> </td>
<td> </td>
@ -214,15 +214,15 @@
<td><a href="techniques/T0080.004.md">T0080.004 Conduct Web Traffic Analysis</a></td>
<td> </td>
<td><a href="techniques/T0090.003.md">T0090.003 Create Bot Accounts</a></td>
<td><a href="techniques/T0099.002.md">T0099.002 Spoof/Parody Account/Site</a></td>
<td><a href="techniques/T0119.001.md">T0119.001 Post across Groups</a></td>
<td><a href="techniques/T0099.004.md">T0099.004 Impersonate Existing Media Outlet</a></td>
<td><a href="techniques/T0118.md">T0118 Amplify Existing Narrative</a></td>
<td><a href="techniques/T0123.004.md">T0123.004 Conduct Server Redirect</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0135.003.md">T0135.003 Subvert</a></td>
<td> </td>
<td><a href="techniques/T0084.004.md">T0084.004 Appropriate Content</a></td>
<td><a href="techniques/T0085.003.md">T0085.003 Develop Inauthentic News Articles</a></td>
<td><a href="techniques/T0104.004.md">T0104.004 Interest-Based Networks</a></td>
<td> </td>
<td> </td>
@ -232,15 +232,15 @@
<td><a href="techniques/T0080.005.md">T0080.005 Assess Degree/Type of Media Access</a></td>
<td> </td>
<td><a href="techniques/T0090.004.md">T0090.004 Create Sockpuppet Accounts</a></td>
<td><a href="techniques/T0100.md">T0100 Co-Opt Trusted Sources</a></td>
<td><a href="techniques/T0119.002.md">T0119.002 Post across Platform</a></td>
<td><a href="techniques/T0099.005.md">T0099.005 Impersonate Existing Official</a></td>
<td><a href="techniques/T0119.md">T0119 Cross-Posting</a></td>
<td><a href="techniques/T0124.md">T0124 Suppress Opposition</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0135.004.md">T0135.004 Polarise</a></td>
<td> </td>
<td><a href="techniques/T0085.md">T0085 Develop Text-Based Content</a></td>
<td><a href="techniques/T0085.004.md">T0085.004 Develop Document</a></td>
<td><a href="techniques/T0104.005.md">T0104.005 Use Hashtags</a></td>
<td> </td>
<td> </td>
@ -250,15 +250,15 @@
<td><a href="techniques/T0081.md">T0081 Identify Social and Technical Vulnerabilities</a></td>
<td> </td>
<td><a href="techniques/T0091.md">T0091 Recruit Malign Actors</a></td>
<td><a href="techniques/T0100.001.md">T0100.001 Co-Opt Trusted Individuals</a></td>
<td><a href="techniques/T0119.003.md">T0119.003 Post across Disciplines</a></td>
<td><a href="techniques/T0099.006.md">T0099.006 Impersonate Existing Influencer</a></td>
<td><a href="techniques/T0119.001.md">T0119.001 Post across Groups</a></td>
<td><a href="techniques/T0124.001.md">T0124.001 Report Non-Violative Opposing Content</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0136.md">T0136 Cultivate Support</a></td>
<td> </td>
<td><a href="techniques/T0085.001.md">T0085.001 Develop AI-Generated Text</a></td>
<td><a href="techniques/T0085.005.md">T0085.005 Develop Book</a></td>
<td><a href="techniques/T0104.006.md">T0104.006 Create Dedicated Hashtag</a></td>
<td> </td>
<td> </td>
@ -268,15 +268,15 @@
<td><a href="techniques/T0081.001.md">T0081.001 Find Echo Chambers</a></td>
<td> </td>
<td><a href="techniques/T0091.001.md">T0091.001 Recruit Contractors</a></td>
<td><a href="techniques/T0100.002.md">T0100.002 Co-Opt Grassroots Groups</a></td>
<td><a href="techniques/T0120.md">T0120 Incentivize Sharing</a></td>
<td><a href="techniques/T0100.md">T0100 Co-Opt Trusted Sources</a></td>
<td><a href="techniques/T0119.002.md">T0119.002 Post across Platform</a></td>
<td><a href="techniques/T0124.002.md">T0124.002 Goad People into Harmful Action (Stop Hitting Yourself)</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0136.001.md">T0136.001 Defend Reputaton</a></td>
<td> </td>
<td><a href="techniques/T0085.002.md">T0085.002 Develop False or Altered Documents</a></td>
<td><a href="techniques/T0085.006.md">T0085.006 Develop Opinion Article</a></td>
<td><a href="techniques/T0105.md">T0105 Media Sharing Networks</a></td>
<td> </td>
<td> </td>
@ -286,15 +286,15 @@
<td><a href="techniques/T0081.002.md">T0081.002 Identify Data Voids</a></td>
<td> </td>
<td><a href="techniques/T0091.002.md">T0091.002 Recruit Partisans</a></td>
<td><a href="techniques/T0100.003.md">T0100.003 Co-Opt Influencers</a></td>
<td><a href="techniques/T0120.001.md">T0120.001 Use Affiliate Marketing Programmes</a></td>
<td><a href="techniques/T0100.001.md">T0100.001 Co-Opt Trusted Individuals</a></td>
<td><a href="techniques/T0119.003.md">T0119.003 Post across Disciplines</a></td>
<td><a href="techniques/T0124.003.md">T0124.003 Exploit Platform TOS/Content Moderation</a></td>
</tr>
<tr>
<td> </td>
<td><a href="techniques/T0136.002.md">T0136.002 Justify Action</a></td>
<td> </td>
<td><a href="techniques/T0085.003.md">T0085.003 Develop Inauthentic News Articles</a></td>
<td><a href="techniques/T0085.007.md">T0085.007 Create Fake Research</a></td>
<td><a href="techniques/T0105.001.md">T0105.001 Photo Sharing</a></td>
<td> </td>
<td> </td>
@ -304,8 +304,8 @@
<td><a href="techniques/T0081.003.md">T0081.003 Identify Existing Prejudices</a></td>
<td> </td>
<td><a href="techniques/T0091.003.md">T0091.003 Enlist Troll Accounts</a></td>
<td> </td>
<td><a href="techniques/T0120.002.md">T0120.002 Use Contests and Prizes</a></td>
<td><a href="techniques/T0100.002.md">T0100.002 Co-Opt Grassroots Groups</a></td>
<td><a href="techniques/T0120.md">T0120 Incentivize Sharing</a></td>
<td><a href="techniques/T0125.md">T0125 Platform Filtering</a></td>
</tr>
<tr>
@ -322,8 +322,8 @@
<td><a href="techniques/T0081.004.md">T0081.004 Identify Existing Fissures</a></td>
<td> </td>
<td><a href="techniques/T0092.md">T0092 Build Network</a></td>
<td> </td>
<td><a href="techniques/T0121.md">T0121 Manipulate Platform Algorithm</a></td>
<td><a href="techniques/T0100.003.md">T0100.003 Co-Opt Influencers</a></td>
<td><a href="techniques/T0120.001.md">T0120.001 Use Affiliate Marketing Programmes</a></td>
<td> </td>
</tr>
<tr>
@ -340,8 +340,8 @@
<td><a href="techniques/T0081.005.md">T0081.005 Identify Existing Conspiracy Narratives/Suspicions</a></td>
<td> </td>
<td><a href="techniques/T0092.001.md">T0092.001 Create Organisations</a></td>
<td> </td>
<td><a href="techniques/T0121.001.md">T0121.001 Bypass Content Blocking</a></td>
<td><a href="techniques/T0142.md">T0142 Fabricate Grassroots Movement</a></td>
<td><a href="techniques/T0120.002.md">T0120.002 Use Contests and Prizes</a></td>
<td> </td>
</tr>
<tr>
@ -359,7 +359,7 @@
<td> </td>
<td><a href="techniques/T0092.002.md">T0092.002 Use Follow Trains</a></td>
<td> </td>
<td><a href="techniques/T0122.md">T0122 Direct Users to Alternative Platforms</a></td>
<td><a href="techniques/T0121.md">T0121 Manipulate Platform Algorithm</a></td>
<td> </td>
</tr>
<tr>
@ -377,7 +377,7 @@
<td> </td>
<td><a href="techniques/T0092.003.md">T0092.003 Create Community or Sub-Group</a></td>
<td> </td>
<td> </td>
<td><a href="techniques/T0121.001.md">T0121.001 Bypass Content Blocking</a></td>
<td> </td>
</tr>
<tr>
@ -395,7 +395,7 @@
<td> </td>
<td><a href="techniques/T0093.md">T0093 Acquire/Recruit Network</a></td>
<td> </td>
<td> </td>
<td><a href="techniques/T0122.md">T0122 Direct Users to Alternative Platforms</a></td>
<td> </td>
</tr>
<tr>
@ -546,7 +546,7 @@
<td> </td>
<td><a href="techniques/T0138.md">T0138 Motivate to Act</a></td>
<td> </td>
<td><a href="techniques/T0089.002.md">T0089.002 Create Inauthentic Documents</a></td>
<td><a href="techniques/T0089.003.md">T0089.003 Alter Authentic Documents</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -564,7 +564,6 @@
<td> </td>
<td><a href="techniques/T0138.001.md">T0138.001 Encourage</a></td>
<td> </td>
<td><a href="techniques/T0089.003.md">T0089.003 Alter Authentic Documents</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -574,6 +573,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0113.md">T0113 Employ Commercial Analytic Firms</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -591,7 +591,7 @@
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0141.md">T0141 Acquire Compromised Asset</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -609,7 +609,7 @@
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0141.001.md">T0141.001 Acquire Compromised Account</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -627,7 +627,7 @@
<td> </td>
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0141.002.md">T0141.002 Acquire Compromised Website</a></td>
<td> </td>
<td> </td>
<td> </td>

View File

@ -17,7 +17,6 @@
| --------- | ------------------------- |
| [T0017 Conduct Fundraising](../../generated_pages/techniques/T0017.md) | IT00000002 Promote "funding" campaign |
| [T0018 Purchase Targeted Advertisements](../../generated_pages/techniques/T0018.md) | IT00000001 buy FB targeted ads |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000003 create web-site - information pollution |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000005 SEO optimisation/manipulation ("key words") |

View File

@ -27,7 +27,6 @@ The report adds that although officially the Russian government asserted its neu
| [T0007 Create Inauthentic Social Media Pages and Groups](../../generated_pages/techniques/T0007.md) | IT00000011 Fake FB groups + dark content |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000016 cultivate, manipulate, exploit useful idiots |
| [T0018 Purchase Targeted Advertisements](../../generated_pages/techniques/T0018.md) | IT00000010 Targeted FB paid ads |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000014 RT & Sputnik generate information pollution |
| [T0029 Online Polls](../../generated_pages/techniques/T0029.md) | IT00000013 manipulate social media "online polls"? |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000022 SEO optimisation/manipulation ("key words") |
| [T0057 Organise Events](../../generated_pages/techniques/T0057.md) | IT00000012 Digital to physical "organize+promote" rallies & events? |

View File

@ -17,7 +17,7 @@
| --------- | ------------------------- |
| [T0007 Create Inauthentic Social Media Pages and Groups](../../generated_pages/techniques/T0007.md) | IT00000029 Fake twitter profiles to amplify |
| [T0015 Create Hashtags and Search Artefacts](../../generated_pages/techniques/T0015.md) | IT00000027 Create and use hashtag |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) | IT00000030 bait journalists/media/politicians |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) | IT00000030 bait journalists/media/politicians |
| [T0043 Chat Apps](../../generated_pages/techniques/T0043.md) | IT00000025 Use SMS/text messages |

View File

@ -16,7 +16,6 @@
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000033 cultivate, manipulate, exploit useful idiots (in the case Paul Manafort) |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000031 RT & Sputnik generate information pollution (report an unreported false story/event) |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -16,7 +16,6 @@
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0007 Create Inauthentic Social Media Pages and Groups](../../generated_pages/techniques/T0007.md) | IT00000039 FB pages |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000037 RT & Sputnik generate information pollution |
| [T0045 Use Fake Experts](../../generated_pages/techniques/T0045.md) | IT00000036 Using "expert" |

View File

@ -18,7 +18,7 @@
| [T0007 Create Inauthentic Social Media Pages and Groups](../../generated_pages/techniques/T0007.md) | IT00000045 FB pages/groups/profiles |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000044 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories; false flags, crisis actors) |
| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000048 4Chan/8Chan - trial content |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) | IT00000049 journalist/media baiting |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) | IT00000049 journalist/media baiting |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000043 SEO optimisation/manipulation ("key words") |

View File

@ -15,7 +15,7 @@
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) | IT00000053 journalist/media baiting |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) | IT00000053 journalist/media baiting |
| [T0044 Seed Distortions](../../generated_pages/techniques/T0044.md) | IT00000052 Circulate to media via DM, then release publicly |

View File

@ -19,7 +19,6 @@
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000063 cultivate, manipulate, exploit useful idiots |
| [T0016 Create Clickbait](../../generated_pages/techniques/T0016.md) | IT00000073 Click-bait (economic actors) fake news sites (ie: Denver Guardian; Macedonian teens) |
| [T0018 Purchase Targeted Advertisements](../../generated_pages/techniques/T0018.md) | IT00000057 Targeted FB paid ads |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000061 RT & Sputnik generate information pollution |
| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000070 4Chan/8Chan - trial content |
| [T0029 Online Polls](../../generated_pages/techniques/T0029.md) | IT00000060 manipulate social media "online polls"? |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000071 SEO optimisation/manipulation ("key words") |

View File

@ -16,7 +16,6 @@
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000084 cultivate, manipulate, exploit useful idiots |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000082 RT & Sputnik generate information pollution (synthetic media) |
| [T0040 Demand Insurmountable Proof](../../generated_pages/techniques/T0040.md) | IT00000089 Demand insurmountable proof |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000085 SEO optimisation/manipulation ("key words") |

View File

@ -17,7 +17,6 @@
| --------- | ------------------------- |
| [T0007 Create Inauthentic Social Media Pages and Groups](../../generated_pages/techniques/T0007.md) | IT00000092 Fake FB groups/pages/profiles |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000104 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000094 RT & Sputnik generate information pollution |
| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000102 4Chan/8Chan - trial content |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000103 SEO optimisation/manipulation ("key words") |
| [T0057 Organise Events](../../generated_pages/techniques/T0057.md) | IT00000093 Digital to physical "organize+promote" rallies & events? |

View File

@ -18,7 +18,7 @@
| [T0002 Facilitate State Propaganda](../../generated_pages/techniques/T0002.md) | IT00000110 facilitate state propaganda and defuse crises |
| [T0047 Censor Social Media as a Political Force](../../generated_pages/techniques/T0047.md) | IT00000108 cow online opinion leaders into submission, muzzling social media as a political force |
| [T0048 Harass](../../generated_pages/techniques/T0048.md) | IT00000109 cow online opinion leaders into submission, muzzling social media as a political force |
| [T0049 Flooding the Information Space](../../generated_pages/techniques/T0049.md) | IT00000105 2,000,000 people (est.) part of state run/sponsored astroturfing |
| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) | IT00000105 2,000,000 people (est.) part of state run/sponsored astroturfing |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -18,8 +18,8 @@ Unique for taking place outside of the Chinese Internet system, both transgressi
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0002 Facilitate State Propaganda](../../generated_pages/techniques/T0002.md) | IT00000111 Netizens from one of the largest discussion forums in China, known as Diba, coordinated to overcome Chinas Great Firewall |
| [T0049 Flooding the Information Space](../../generated_pages/techniques/T0049.md) | IT00000112 flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message |
| [T0049 Flooding the Information Space](../../generated_pages/techniques/T0049.md) | IT00000113 Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. |
| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) | IT00000112 flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message |
| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) | IT00000113 Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -15,7 +15,6 @@
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0011 Compromise Legitimate Accounts](../../generated_pages/techniques/T0011.md) | IT00000114 “hack” of Qatars official news agency |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -17,7 +17,6 @@
| --------- | ------------------------- |
| [T0009 Create Fake Experts](../../generated_pages/techniques/T0009.md) | IT00000127 Promote fake “experts” with impressive (and scary) titles |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000126 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000120 RT & Sputnik generate information pollution |
| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000124 4Chan/8Chan - trial content |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000125 SEO optimisation/manipulation ("key words") |

View File

@ -16,7 +16,6 @@
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000139 cultivate, manipulate, exploit useful idiots (Roger Waters; Venessa Beeley...) |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000137 RT & Sputnik generate information pollution (synthetic media) |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000140 SEO optimisation/manipulation ("key words") |

View File

@ -19,7 +19,6 @@ Maduro has remained defiant in the face of domestic and international pressure,
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000148 cultivate, manipulate, exploit useful idiots (Roger Waters) |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000146 RT & Sputnik generate information pollution (synthetic media) |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000149 SEO optimisation/manipulation ("key words") |

View File

@ -17,7 +17,6 @@ The FCO comments on the IfS were issued after a news report said the group had r
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000158 cultivate, manipulate, exploit useful idiots |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000156 RT & Sputnik generate information pollution |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000161 SEO optimisation/manipulation ("key words") |

View File

@ -18,7 +18,6 @@ The investigation found corroborating evidence after conducting witness intervie
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000182 cultivate, manipulate, exploit useful idiots |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) | IT00000180 RT & Sputnik generate information pollution (synthetic media) |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000183 SEO optimisation/manipulation ("key words") |

View File

@ -0,0 +1,25 @@
# Incident I00064: Tinder nightmares: the promise and peril of political bots
* **Summary:** > In the days leading up to the UKs general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes.
* **incident type**: incident
* **Year started:** 2017
* **Countries:** UK , UK
* **Found via:**
* **Date added:** 2024-03-12
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0104.002 Dating App](../../generated_pages/techniques/T0104.002.md) | IT00000214 > In the days leading up to the UKs [2017] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes.
> Tinder is a dating app where users swipe right to indicate attraction and interest in a potential partner. If both people swipe right on each others profile, a dialogue box becomes available for them to privately chat. After meeting their crowdfunding goal of only £500, the team built a tool which took over and operated the accounts of recruited Tinder-users. By upgrading the profiles to Tinder Premium, the team was able to place bots in any contested constituency across the UK. Once planted, the bots swiped right on all users in the attempt to get the largest number of matches and inquire into their voting intentions.
This incident matches _T0104.002: Dating App,_ as users of Tinder were targeted in an attempt to persuade users to vote for a particular party in the upcoming election, rather than for the purpose of connecting those who were authentically interested in dating each other. |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,23 @@
# Incident I00065: 'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests
* **Summary:** > Mandiant Threat Intelligence has tied together several information operations that we assess with moderate confidence comprise part of a broader influence campaign—ongoing since at least March 2017—aligned with Russian security interests. The operations have primarily targeted audiences in Lithuania, Latvia, and Poland with narratives critical of the North Atlantic Treaty Organizations (NATO) presence in Eastern Europe, occasionally leveraging other themes such as anti-U.S. and COVID-19-related narratives as part of this broader anti-NATO agenda. We have dubbed this campaign “Ghostwriter.”
* **incident type**: campaign
* **Year started:** 2020
* **Countries:** Belarus , Lithuania, Latvia, Poland
* **Found via:**
* **Date added:** 2024-03-12
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0141.001 Acquire Compromised Account](../../generated_pages/techniques/T0141.001.md) | IT00000215 > Overall, narratives promoted in the five operations appear to represent a concerted effort to discredit the ruling political coalition, widen existing domestic political divisions and project an image of coalition disunity in Poland. In each incident, content was primarily disseminated via Twitter, Facebook, and/ or Instagram accounts belonging to Polish politicians, all of whom have publicly claimed their accounts were compromised at the times the posts were made.  
This example demonstrates how threat actors can use _T0141.001: Acquire Compromised Account_ to distribute inauthentic content while exploiting the legitimate account holders persona. |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,38 @@
# Incident I00066: The online war between Qatar and Saudi Arabia
* **Summary:** > In the early hours of 24 May 2017, a news story appeared on the website of Qatar's official news agency, QNA, reporting that the country's emir, Sheikh Tamim bin Hamad al-Thani, had made an astonishing speech.
> […]
> Qatar claimed that the QNA had been hacked. And they said the hack was designed to deliberately spread fake news about the country's leader and its foreign policies. The Qataris specifically blamed UAE, an allegation later repeated by a Washington Post report which cited US intelligence sources. The UAE categorically denied those reports.
> But the story of the emir's speech unleashed a media free-for-all. Within minutes, Saudi and UAE-owned TV networks - Al Arabiya and Sky News Arabia - picked up on the comments attributed to al-Thani. Both networks accused Qatar of funding extremist groups and of destabilising the region.
This incident demonstrates how a hack of a mainstream news agency website allowed for an inauthentic narrative to be given a level of credibility which caused significant political fallout.
* **incident type**: incident
* **Year started:** 2017
* **Countries:** , Qatar
* **Found via:**
* **Date added:** 2024-03-12
| Technique | Description given for this incident |
| --------- | ------------------------- |
| [T0141.002 Acquire Compromised Website](../../generated_pages/techniques/T0141.002.md) | IT00000216 > In the early hours of 24 May 2017, a news story appeared on the website of Qatar's official news agency, QNA, reporting that the country's emir, Sheikh Tamim bin Hamad al-Thani, had made an astonishing speech.
> […]
> Qatar claimed that the QNA had been hacked. And they said the hack was designed to deliberately spread fake news about the country's leader and its foreign policies. The Qataris specifically blamed UAE, an allegation later repeated by a Washington Post report which cited US intelligence sources. The UAE categorically denied those reports.
> But the story of the emir's speech unleashed a media free-for-all. Within minutes, Saudi and UAE-owned TV networks - Al Arabiya and Sky News Arabia - picked up on the comments attributed to al-Thani. Both networks accused Qatar of funding extremist groups and of destabilising the region.
This incident demonstrates how threat actors used _T0141.002: Acquire Compromised Website_ to allow for an inauthentic narrative to be given a level of credibility which caused significant political fallout. |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -513,4 +513,28 @@
<td>World</td>
<td></td>
</tr>
<tr>
<td><a href="incidents/I00064.md">I00064</a></td>
<td>Tinder nightmares: the promise and peril of political bots</td>
<td>incident</td>
<td>2017</td>
<td>UK</td>
<td></td>
</tr>
<tr>
<td><a href="incidents/I00065.md">I00065</a></td>
<td>'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests</td>
<td>campaign</td>
<td>2020</td>
<td>Lithuania, Latvia, Poland</td>
<td></td>
</tr>
<tr>
<td><a href="incidents/I00066.md">I00066</a></td>
<td>The online war between Qatar and Saudi Arabia</td>
<td>incident</td>
<td>2017</td>
<td>Qatar</td>
<td></td>
</tr>
</table>

View File

@ -1,6 +1,6 @@
# Tactic TA05: Microtarget
* **Summary:** Target very specific populations of people
* **Summary:** Actions taken which help target content to specific audiences identified and analysed as part of TA13: Target Audience Analysis.
* **Belongs to phase:** P02

View File

@ -17,9 +17,6 @@
| Techniques |
| ---------- |
| [T0015 Create Hashtags and Search Artefacts](../../generated_pages/techniques/T0015.md) |
| [T0019 Generate Information Pollution](../../generated_pages/techniques/T0019.md) |
| [T0019.001 Create Fake Research](../../generated_pages/techniques/T0019.001.md) |
| [T0019.002 Hijack Hashtags](../../generated_pages/techniques/T0019.002.md) |
| [T0023 Distort Facts](../../generated_pages/techniques/T0023.md) |
| [T0023.001 Reframe Context](../../generated_pages/techniques/T0023.001.md) |
| [T0023.002 Edit Open-Source Content](../../generated_pages/techniques/T0023.002.md) |
@ -30,8 +27,11 @@
| [T0084.004 Appropriate Content](../../generated_pages/techniques/T0084.004.md) |
| [T0085 Develop Text-Based Content](../../generated_pages/techniques/T0085.md) |
| [T0085.001 Develop AI-Generated Text](../../generated_pages/techniques/T0085.001.md) |
| [T0085.002 Develop False or Altered Documents](../../generated_pages/techniques/T0085.002.md) |
| [T0085.003 Develop Inauthentic News Articles](../../generated_pages/techniques/T0085.003.md) |
| [T0085.004 Develop Document](../../generated_pages/techniques/T0085.004.md) |
| [T0085.005 Develop Book](../../generated_pages/techniques/T0085.005.md) |
| [T0085.006 Develop Opinion Article](../../generated_pages/techniques/T0085.006.md) |
| [T0085.007 Create Fake Research](../../generated_pages/techniques/T0085.007.md) |
| [T0086 Develop Image-Based Content](../../generated_pages/techniques/T0086.md) |
| [T0086.001 Develop Memes](../../generated_pages/techniques/T0086.001.md) |
| [T0086.002 Develop AI-Generated Images (Deepfakes)](../../generated_pages/techniques/T0086.002.md) |
@ -45,7 +45,6 @@
| [T0088.002 Deceptively Edit Audio (Cheap Fakes)](../../generated_pages/techniques/T0088.002.md) |
| [T0089 Obtain Private Documents](../../generated_pages/techniques/T0089.md) |
| [T0089.001 Obtain Authentic Documents](../../generated_pages/techniques/T0089.001.md) |
| [T0089.002 Create Inauthentic Documents](../../generated_pages/techniques/T0089.002.md) |
| [T0089.003 Alter Authentic Documents](../../generated_pages/techniques/T0089.003.md) |

View File

@ -23,7 +23,7 @@
| [T0103.002 Audio Livestream](../../generated_pages/techniques/T0103.002.md) |
| [T0104 Social Networks](../../generated_pages/techniques/T0104.md) |
| [T0104.001 Mainstream Social Networks](../../generated_pages/techniques/T0104.001.md) |
| [T0104.002 Dating Apps](../../generated_pages/techniques/T0104.002.md) |
| [T0104.002 Dating App](../../generated_pages/techniques/T0104.002.md) |
| [T0104.003 Private/Closed Social Networks](../../generated_pages/techniques/T0104.003.md) |
| [T0104.004 Interest-Based Networks](../../generated_pages/techniques/T0104.004.md) |
| [T0104.005 Use Hashtags](../../generated_pages/techniques/T0104.005.md) |

View File

@ -17,12 +17,10 @@
| Techniques |
| ---------- |
| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) |
| [T0039 Bait Legitimate Influencers](../../generated_pages/techniques/T0039.md) |
| [T0042 Seed Kernel of Truth](../../generated_pages/techniques/T0042.md) |
| [T0044 Seed Distortions](../../generated_pages/techniques/T0044.md) |
| [T0045 Use Fake Experts](../../generated_pages/techniques/T0045.md) |
| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) |
| [T0113 Employ Commercial Analytic Firms](../../generated_pages/techniques/T0113.md) |

View File

@ -1,7 +1,9 @@
# Tactic TA15: Establish Social Assets
# Tactic TA15: Establish Assets
* **Summary:** Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organisations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.
This Tactic was previously called Establish Social Assets.
* **Belongs to phase:** P02
@ -52,6 +54,10 @@
| [T0096 Leverage Content Farms](../../generated_pages/techniques/T0096.md) |
| [T0096.001 Create Content Farms](../../generated_pages/techniques/T0096.001.md) |
| [T0096.002 Outsource Content Creation to External Organisations](../../generated_pages/techniques/T0096.002.md) |
| [T0113 Employ Commercial Analytic Firms](../../generated_pages/techniques/T0113.md) |
| [T0141 Acquire Compromised Asset](../../generated_pages/techniques/T0141.md) |
| [T0141.001 Acquire Compromised Account](../../generated_pages/techniques/T0141.001.md) |
| [T0141.002 Acquire Compromised Website](../../generated_pages/techniques/T0141.002.md) |

View File

@ -15,19 +15,22 @@
| ---------- |
| [T0009 Create Fake Experts](../../generated_pages/techniques/T0009.md) |
| [T0009.001 Utilise Academic/Pseudoscientific Justifications](../../generated_pages/techniques/T0009.001.md) |
| [T0011 Compromise Legitimate Accounts](../../generated_pages/techniques/T0011.md) |
| [T0097 Create Personas](../../generated_pages/techniques/T0097.md) |
| [T0097.001 Backstop Personas](../../generated_pages/techniques/T0097.001.md) |
| [T0097.001 Produce Evidence for Persona](../../generated_pages/techniques/T0097.001.md) |
| [T0098 Establish Inauthentic News Sites](../../generated_pages/techniques/T0098.md) |
| [T0098.001 Create Inauthentic News Sites](../../generated_pages/techniques/T0098.001.md) |
| [T0098.002 Leverage Existing Inauthentic News Sites](../../generated_pages/techniques/T0098.002.md) |
| [T0099 Prepare Assets Impersonating Legitimate Entities](../../generated_pages/techniques/T0099.md) |
| [T0099.001 Astroturfing](../../generated_pages/techniques/T0099.001.md) |
| [T0099 Impersonate Existing Entity](../../generated_pages/techniques/T0099.md) |
| [T0099.002 Spoof/Parody Account/Site](../../generated_pages/techniques/T0099.002.md) |
| [T0099.003 Impersonate Existing Organisation](../../generated_pages/techniques/T0099.003.md) |
| [T0099.004 Impersonate Existing Media Outlet](../../generated_pages/techniques/T0099.004.md) |
| [T0099.005 Impersonate Existing Official](../../generated_pages/techniques/T0099.005.md) |
| [T0099.006 Impersonate Existing Influencer](../../generated_pages/techniques/T0099.006.md) |
| [T0100 Co-Opt Trusted Sources](../../generated_pages/techniques/T0100.md) |
| [T0100.001 Co-Opt Trusted Individuals](../../generated_pages/techniques/T0100.001.md) |
| [T0100.002 Co-Opt Grassroots Groups](../../generated_pages/techniques/T0100.002.md) |
| [T0100.003 Co-Opt Influencers](../../generated_pages/techniques/T0100.003.md) |
| [T0142 Fabricate Grassroots Movement](../../generated_pages/techniques/T0142.md) |

View File

@ -13,14 +13,16 @@
| Techniques |
| ---------- |
| [T0049 Flooding the Information Space](../../generated_pages/techniques/T0049.md) |
| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) |
| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) |
| [T0049.001 Trolls Amplify and Manipulate](../../generated_pages/techniques/T0049.001.md) |
| [T0049.002 Hijack Existing Hashtag](../../generated_pages/techniques/T0049.002.md) |
| [T0049.002 Flood Existing Hashtag](../../generated_pages/techniques/T0049.002.md) |
| [T0049.003 Bots Amplify via Automated Forwarding and Reposting](../../generated_pages/techniques/T0049.003.md) |
| [T0049.004 Utilise Spamoflauge](../../generated_pages/techniques/T0049.004.md) |
| [T0049.005 Conduct Swarming](../../generated_pages/techniques/T0049.005.md) |
| [T0049.006 Conduct Keyword Squatting](../../generated_pages/techniques/T0049.006.md) |
| [T0049.007 Inauthentic Sites Amplify News and Narratives](../../generated_pages/techniques/T0049.007.md) |
| [T0049.008 Generate Information Pollution](../../generated_pages/techniques/T0049.008.md) |
| [T0118 Amplify Existing Narrative](../../generated_pages/techniques/T0118.md) |
| [T0119 Cross-Posting](../../generated_pages/techniques/T0119.md) |
| [T0119.001 Post across Groups](../../generated_pages/techniques/T0119.001.md) |

View File

@ -100,7 +100,7 @@
<td>3</td>
</tr>
<tr>
<td><a href="../generated_pages/tactics/TA15.md">TA15 Establish Social Assets</a></td>
<td><a href="../generated_pages/tactics/TA15.md">TA15 Establish Assets</a></td>
<td>10</td>
<td>7</td>
<td>6</td>

View File

@ -22,7 +22,7 @@
<tr>
<td><a href="tactics/TA05.md">TA05</a></td>
<td>Microtarget</td>
<td>Target very specific populations of people</td>
<td>Actions taken which help target content to specific audiences identified and analysed as part of TA13: Target Audience Analysis.</td>
<td>P02</td>
</tr>
<tr>
@ -81,8 +81,10 @@
</tr>
<tr>
<td><a href="tactics/TA15.md">TA15</a></td>
<td>Establish Social Assets</td>
<td>Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organisations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.</td>
<td>Establish Assets</td>
<td>Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organisations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.
This Tactic was previously called Establish Social Assets.</td>
<td>P02</td>
</tr>
<tr>

View File

@ -1,8 +1,10 @@
# Technique T0039: Bait Legitimate Influencers
# Technique T0039: Bait Influencer
* **Summary**: Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organisations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.
* **Summary**: Influencers are people on social media platforms who have large audiences. 
* **Belongs to tactic stage**: TA08
Threat Actors can try to trick Influencers such as celebrities, journalists, or local leaders who arent associated with their campaign into amplifying campaign content. This gives them access to the Influencers audience without having to go through the effort of building it themselves, and it helps legitimise their message by associating it with the Influencer, benefitting from their audiences trust in them.
* **Belongs to tactic stage**: TA17
| Incident | Descriptions given for this incident |

View File

@ -1,6 +1,12 @@
# Technique T0049.002: Hijack Existing Hashtag
# Technique T0049.002: Flood Existing Hashtag
* **Summary**: Take over an existing hashtag to drive exposure.
* **Summary**: Hashtags can be used by communities to collate information they post about particular topics (such as their interests, or current events) and users can find communities to join by exploring hashtags theyre interested in. 
Threat actors can flood an existing hashtag to try to ruin hashtag functionality, posting content unrelated to the hashtag alongside it, making it a less reliable source of relevant information. They may also try to flood existing hashtags with campaign content, with the intent of maximising exposure to users.
This Technique covers cases where threat actors flood existing hashtags with campaign content.
This Technique covers behaviours previously documented by T0019.002: Hijack Hashtags, which has since been deprecated. This Technique was previously called Hijack Existing Hashtag.
* **Belongs to tactic stage**: TA17

View File

@ -0,0 +1,23 @@
# Technique T0049.008: Generate Information Pollution
* **Summary**: Information Pollution occurs when threat actors attempt to ruin a source of information by flooding it with lots of inauthentic or unreliable content, intending to make it harder for legitimate users to find the information theyre looking for. 
This subtechnique's objective is to reduce exposure to target information, rather than promoting exposure to campaign content, for which the parent technique T0049 can be used. 
Analysts will need to infer what the motive for flooding an information space was when deciding whether to use T0049 or T0049.008 to tag a case when an information space is flooded. If such inference is not possible, default to T0049.
This Technique previously used the ID T0019.
* **Belongs to tactic stage**: TA17
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -1,6 +1,12 @@
# Technique T0049: Flooding the Information Space
# Technique T0049: Flood Information Space
* **Summary**: Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.
* **Summary**: Flooding sources of information (e.g. Social Media feeds) with a high volume of inauthentic content.
This can be done to control/shape online conversations, drown out opposing points of view, or make it harder to find legitimate information. 
Bots and/or patriotic trolls are effective tools to achieve this effect.
This Technique previously used the name Flooding the Information Space.
* **Belongs to tactic stage**: TA17

View File

@ -0,0 +1,17 @@
# Technique T0085.004: Develop Document
* **Summary**: Produce text in the form of a document.
* **Belongs to tactic stage**: TA06
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,19 @@
# Technique T0085.005: Develop Book
* **Summary**: Produce text content in the form of a book. 
This technique covers both e-books and physical books, however, the former is more easily deployed by threat actors given the lower cost to develop.
* **Belongs to tactic stage**: TA06
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,23 @@
# Technique T0085.006: Develop Opinion Article
* **Summary**: Opinion articles (aka “Op-Eds” or “Editorials”) are articles or regular columns flagged as “opinion” posted to news sources, and can be contributed by people outside the organisation. 
Flagging articles as opinions allow news organisations to distinguish them from the typical expectations of objective news reporting while distancing the presented opinion from the organisation or its employees.
The use of this technique is not by itself an indication of malicious or inauthentic content; Op-eds are a common format in media. However, threat actors exploit op-eds to, for example, submit opinion articles to local media to promote their narratives.
Examples from the perspective of a news site involve publishing op-eds from perceived prestigious voices to give legitimacy to an inauthentic publication, or supporting causes by hosting op-eds from actors aligned with the organisations goals.
* **Belongs to tactic stage**: TA06
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,19 @@
# Technique T0085.007: Create Fake Research
* **Summary**: Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx.
This Technique previously used the ID T0019.001
* **Belongs to tactic stage**: TA06
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -1,6 +1,6 @@
# Technique T0089.003: Alter Authentic Documents
* **Summary**: Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic can be "leaked" during later stages in the operation.
* **Summary**: Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic and can be "leaked" during later stages in the operation.
* **Belongs to tactic stage**: TA06

View File

@ -1,6 +1,12 @@
# Technique T0097.001: Backstop Personas
# Technique T0097.001: Produce Evidence for Persona
* **Summary**: Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believability
* **Summary**: People may produce evidence which supports the persona they are deploying (T0097) (aka “backstopping” the persona).
This Technique covers situations where evidence is developed or produced as part of an influence operation to increase the perceived legitimacy of a persona used during IO, including creating accounts for the same persona on multiple platforms.
The use of personas (T0097), and providing evidence to improve peoples perception of ones persona (T0097.001), are not necessarily malicious or inauthentic. However, sometimes people use personas to increase the perceived legitimacy of narratives for malicious purposes.
This Technique was previously called Backstop Personas.
* **Belongs to tactic stage**: TA16

View File

@ -0,0 +1,19 @@
# Technique T0099.003: Impersonate Existing Organisation
* **Summary**: A situation where a threat actor styles their online assets or content to mimic an existing organisation.
This can be done to take advantage of peoples trust in the organisation to increase narrative believability, to smear the organisation, or to make the organisation less trustworthy.
* **Belongs to tactic stage**: TA16
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,19 @@
# Technique T0099.004: Impersonate Existing Media Outlet
* **Summary**: A situation where a threat actor styles their online assets or content to mimic an existing media outlet.
This can be done to take advantage of peoples trust in the outlet to increase narrative believability, to smear the outlet, or to make the outlet less trustworthy.
* **Belongs to tactic stage**: TA16
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0099.005: Impersonate Existing Official
* **Summary**: A situation where a threat actor styles their online assets or content to impersonate an official (including government officials, organisation officials, etc).
* **Belongs to tactic stage**: TA16
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0099.006: Impersonate Existing Influencer
* **Summary**: A situation where a threat actor styles their online assets or content to impersonate an influencer or celebrity, typically to exploit users existing faith in the impersonated target.
* **Belongs to tactic stage**: TA16
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -1,6 +1,12 @@
# Technique T0099: Prepare Assets Impersonating Legitimate Entities
# Technique T0099: Impersonate Existing Entity
* **Summary**: An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organisations, or state entities. An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct.
* **Summary**: An influence operation may prepare assets impersonating existing entities (both organisations and people) to further conceal its network identity and add a layer of legitimacy to its operation content. Existing entities may include authentic news outlets, public figures, organisations, or state entities. 
Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. 
An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. 
This Technique was previously called Prepare Assets Impersonating Legitimate Entities.
* **Belongs to tactic stage**: TA16

View File

@ -1,12 +1,21 @@
# Technique T0104.002: Dating Apps
# Technique T0104.002: Dating App
* **Summary**: Dating Apps
* **Summary**: “Dating App” refers to any platform (or platform feature) in which the ostensive purpose is for users to develop a physical/romantic relationship with other users.
Threat Actors can exploit users quest for love to trick them into doing things like revealing sensitive information or giving them money.
Examples include Tinder, Bumble, Grindr, Facebook Dating, Tantan, Badoo, Plenty of Fish, hinge, LOVOO, OkCupid, happn, and Mamba.
* **Belongs to tactic stage**: TA07
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| [I00064 Tinder nightmares: the promise and peril of political bots](../../generated_pages/incidents/I00064.md) | > In the days leading up to the UKs [2017] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes.
> Tinder is a dating app where users swipe right to indicate attraction and interest in a potential partner. If both people swipe right on each others profile, a dialogue box becomes available for them to privately chat. After meeting their crowdfunding goal of only £500, the team built a tool which took over and operated the accounts of recruited Tinder-users. By upgrading the profiles to Tinder Premium, the team was able to place bots in any contested constituency across the UK. Once planted, the bots swiped right on all users in the attempt to get the largest number of matches and inquire into their voting intentions.
This incident matches _T0104.002: Dating App,_ as users of Tinder were targeted in an attempt to persuade users to vote for a particular party in the upcoming election, rather than for the purpose of connecting those who were authentically interested in dating each other. |

View File

@ -2,7 +2,7 @@
* **Summary**: Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences.
* **Belongs to tactic stage**: TA08
* **Belongs to tactic stage**: TA15
| Incident | Descriptions given for this incident |

View File

@ -0,0 +1,28 @@
# Technique T0141.001: Acquire Compromised Account
* **Summary**: Threat Actors can take over existing users accounts to distribute campaign content. 
The actor may maintain the assets previous identity to capitalise on the perceived legitimacy its previous owner had cultivated.
The actor may completely rebrand the account to exploit its existing reach, or relying on the accounts history to avoid more stringent automated content moderation rules applied to new accounts.
See also [Mitre ATT&CKs T1586 Compromise Accounts](https://attack.mitre.org/techniques/T1586/) for more technical information on how threat actors may achieve this objective.
This Technique was previously called Compromise Legitimate Accounts, and used the ID T0011.
* **Belongs to tactic stage**: TA15
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| [I00065 'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests](../../generated_pages/incidents/I00065.md) | > Overall, narratives promoted in the five operations appear to represent a concerted effort to discredit the ruling political coalition, widen existing domestic political divisions and project an image of coalition disunity in Poland. In each incident, content was primarily disseminated via Twitter, Facebook, and/ or Instagram accounts belonging to Polish politicians, all of whom have publicly claimed their accounts were compromised at the times the posts were made.  
This example demonstrates how threat actors can use _T0141.001: Acquire Compromised Account_ to distribute inauthentic content while exploiting the legitimate account holders persona. |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,28 @@
# Technique T0141.002: Acquire Compromised Website
* **Summary**: Threat Actors may take over existing websites to publish or amplify inauthentic narratives. This includes the defacement of websites, and cases where websites personas are maintained to add credence to threat actors narratives.
See also [Mitre ATT&CKs T1584 Compromise Infrastructure](https://attack.mitre.org/techniques/T1584/) for more technical information on how threat actors may achieve this objective.
* **Belongs to tactic stage**: TA15
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| [I00066 The online war between Qatar and Saudi Arabia](../../generated_pages/incidents/I00066.md) | > In the early hours of 24 May 2017, a news story appeared on the website of Qatar's official news agency, QNA, reporting that the country's emir, Sheikh Tamim bin Hamad al-Thani, had made an astonishing speech.
> […]
> Qatar claimed that the QNA had been hacked. And they said the hack was designed to deliberately spread fake news about the country's leader and its foreign policies. The Qataris specifically blamed UAE, an allegation later repeated by a Washington Post report which cited US intelligence sources. The UAE categorically denied those reports.
> But the story of the emir's speech unleashed a media free-for-all. Within minutes, Saudi and UAE-owned TV networks - Al Arabiya and Sky News Arabia - picked up on the comments attributed to al-Thani. Both networks accused Qatar of funding extremist groups and of destabilising the region.
This incident demonstrates how threat actors used _T0141.002: Acquire Compromised Website_ to allow for an inauthentic narrative to be given a level of credibility which caused significant political fallout. |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,17 @@
# Technique T0141: Acquire Compromised Asset
* **Summary**: Threat Actors may take over existing assets not owned by them through nefarious means, such as using technical exploits, hacking, purchasing compromised accounts from the dark web, or social engineering.
* **Belongs to tactic stage**: TA15
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -0,0 +1,21 @@
# Technique T0142: Fabricate Grassroots Movement
* **Summary**: This technique, sometimes known as "astroturfing", occurs when an influence operation disguises itself as a grassroots movement or organisation that supports operation narratives. 
Astroturfing aims to increase the appearance of popular support for an evolving grassroots movement in contrast to "Utilise Butterfly Attacks", which aims to discredit an existing grassroots movement. 
This Technique was previously called Astroturfing, and used the ID T0099.001
* **Belongs to tactic stage**: TA16
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW

View File

@ -50,12 +50,6 @@
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0011.md">T0011</a></td>
<td>Compromise Legitimate Accounts</td>
<td>Hack or take over legimate accounts to distribute misinformation or damaging content.</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0013.md">T0013</a></td>
<td>Create Inauthentic Websites</td>
<td>Create media assets to support inauthentic organisations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations.</td>
@ -110,24 +104,6 @@
<td>TA05</td>
</tr>
<tr>
<td><a href="techniques/T0019.md">T0019</a></td>
<td>Generate Information Pollution</td>
<td>Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0019.001.md">T0019.001</a></td>
<td>Create Fake Research</td>
<td>Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0019.002.md">T0019.002</a></td>
<td>Hijack Hashtags</td>
<td>Hashtag hijacking occurs when users “[use] a trending hashtag to promote topics that are substantially different from its recent context” (VanDam and Tan, 2016) or “to promote ones own social media agenda” (Darius and Stephany, 2019).</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0020.md">T0020</a></td>
<td>Trial Content</td>
<td>Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates</td>
@ -177,9 +153,11 @@
</tr>
<tr>
<td><a href="techniques/T0039.md">T0039</a></td>
<td>Bait Legitimate Influencers</td>
<td>Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organisations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.</td>
<td>TA08</td>
<td>Bait Influencer</td>
<td>Influencers are people on social media platforms who have large audiences. 
Threat Actors can try to trick Influencers such as celebrities, journalists, or local leaders who arent associated with their campaign into amplifying campaign content. This gives them access to the Influencers audience without having to go through the effort of building it themselves, and it helps legitimise their message by associating it with the Influencer, benefitting from their audiences trust in them.</td>
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0040.md">T0040</a></td>
@ -267,8 +245,14 @@
</tr>
<tr>
<td><a href="techniques/T0049.md">T0049</a></td>
<td>Flooding the Information Space</td>
<td>Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.</td>
<td>Flood Information Space</td>
<td>Flooding sources of information (e.g. Social Media feeds) with a high volume of inauthentic content.
This can be done to control/shape online conversations, drown out opposing points of view, or make it harder to find legitimate information. 
Bots and/or patriotic trolls are effective tools to achieve this effect.
This Technique previously used the name Flooding the Information Space.</td>
<td>TA17</td>
</tr>
<tr>
@ -279,8 +263,14 @@
</tr>
<tr>
<td><a href="techniques/T0049.002.md">T0049.002</a></td>
<td>Hijack Existing Hashtag</td>
<td>Take over an existing hashtag to drive exposure.</td>
<td>Flood Existing Hashtag</td>
<td>Hashtags can be used by communities to collate information they post about particular topics (such as their interests, or current events) and users can find communities to join by exploring hashtags theyre interested in. 
Threat actors can flood an existing hashtag to try to ruin hashtag functionality, posting content unrelated to the hashtag alongside it, making it a less reliable source of relevant information. They may also try to flood existing hashtags with campaign content, with the intent of maximising exposure to users.
This Technique covers cases where threat actors flood existing hashtags with campaign content.
This Technique covers behaviours previously documented by T0019.002: Hijack Hashtags, which has since been deprecated. This Technique was previously called Hijack Existing Hashtag.</td>
<td>TA17</td>
</tr>
<tr>
@ -314,6 +304,18 @@
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0049.008.md">T0049.008</a></td>
<td>Generate Information Pollution</td>
<td>Information Pollution occurs when threat actors attempt to ruin a source of information by flooding it with lots of inauthentic or unreliable content, intending to make it harder for legitimate users to find the information theyre looking for. 
This subtechnique's objective is to reduce exposure to target information, rather than promoting exposure to campaign content, for which the parent technique T0049 can be used. 
Analysts will need to infer what the motive for flooding an information space was when deciding whether to use T0049 or T0049.008 to tag a case when an information space is flooded. If such inference is not possible, default to T0049.
This Technique previously used the ID T0019.</td>
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0057.md">T0057</a></td>
<td>Organise Events</td>
<td>Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.</td>
@ -620,18 +622,46 @@
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0085.002.md">T0085.002</a></td>
<td>Develop False or Altered Documents</td>
<td>Develop False or Altered Documents</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0085.003.md">T0085.003</a></td>
<td>Develop Inauthentic News Articles</td>
<td>An influence operation may develop false or misleading news articles aligned to their campaign goals or narratives.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0085.004.md">T0085.004</a></td>
<td>Develop Document</td>
<td>Produce text in the form of a document.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0085.005.md">T0085.005</a></td>
<td>Develop Book</td>
<td>Produce text content in the form of a book. 
This technique covers both e-books and physical books, however, the former is more easily deployed by threat actors given the lower cost to develop.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0085.006.md">T0085.006</a></td>
<td>Develop Opinion Article</td>
<td>Opinion articles (aka “Op-Eds” or “Editorials”) are articles or regular columns flagged as “opinion” posted to news sources, and can be contributed by people outside the organisation. 
Flagging articles as opinions allow news organisations to distinguish them from the typical expectations of objective news reporting while distancing the presented opinion from the organisation or its employees.
The use of this technique is not by itself an indication of malicious or inauthentic content; Op-eds are a common format in media. However, threat actors exploit op-eds to, for example, submit opinion articles to local media to promote their narratives.
Examples from the perspective of a news site involve publishing op-eds from perceived prestigious voices to give legitimacy to an inauthentic publication, or supporting causes by hosting op-eds from actors aligned with the organisations goals.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0085.007.md">T0085.007</a></td>
<td>Create Fake Research</td>
<td>Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx.
This Technique previously used the ID T0019.001</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0086.md">T0086</a></td>
<td>Develop Image-Based Content</td>
<td>Creating and editing false or misleading visual artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include photographing staged real-life situations, repurposing existing digital images, or using image creation and editing technologies.</td>
@ -710,15 +740,9 @@
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0089.002.md">T0089.002</a></td>
<td>Create Inauthentic Documents</td>
<td>Create inauthentic documents intended to appear as if they are authentic non-public documents. These documents can be "leaked" during later stages in the operation.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0089.003.md">T0089.003</a></td>
<td>Alter Authentic Documents</td>
<td>Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic can be "leaked" during later stages in the operation.</td>
<td>Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic and can be "leaked" during later stages in the operation.</td>
<td>TA06</td>
</tr>
<tr>
@ -867,8 +891,14 @@
</tr>
<tr>
<td><a href="techniques/T0097.001.md">T0097.001</a></td>
<td>Backstop Personas</td>
<td>Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believability</td>
<td>Produce Evidence for Persona</td>
<td>People may produce evidence which supports the persona they are deploying (T0097) (aka “backstopping” the persona).
This Technique covers situations where evidence is developed or produced as part of an influence operation to increase the perceived legitimacy of a persona used during IO, including creating accounts for the same persona on multiple platforms.
The use of personas (T0097), and providing evidence to improve peoples perception of ones persona (T0097.001), are not necessarily malicious or inauthentic. However, sometimes people use personas to increase the perceived legitimacy of narratives for malicious purposes.
This Technique was previously called Backstop Personas.</td>
<td>TA16</td>
</tr>
<tr>
@ -891,14 +921,14 @@
</tr>
<tr>
<td><a href="techniques/T0099.md">T0099</a></td>
<td>Prepare Assets Impersonating Legitimate Entities</td>
<td>An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organisations, or state entities. An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct.</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0099.001.md">T0099.001</a></td>
<td>Astroturfing</td>
<td>Astroturfing occurs when an influence operation disguises itself as grassroots movement or organisation that supports operation narratives. Unlike butterfly attacks, astroturfing aims to increase the appearance of popular support for the operation cause and does not infiltrate existing groups to discredit their objectives.</td>
<td>Impersonate Existing Entity</td>
<td>An influence operation may prepare assets impersonating existing entities (both organisations and people) to further conceal its network identity and add a layer of legitimacy to its operation content. Existing entities may include authentic news outlets, public figures, organisations, or state entities. 
Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. 
An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. 
This Technique was previously called Prepare Assets Impersonating Legitimate Entities.</td>
<td>TA16</td>
</tr>
<tr>
@ -908,6 +938,34 @@
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0099.003.md">T0099.003</a></td>
<td>Impersonate Existing Organisation</td>
<td>A situation where a threat actor styles their online assets or content to mimic an existing organisation.
This can be done to take advantage of peoples trust in the organisation to increase narrative believability, to smear the organisation, or to make the organisation less trustworthy.</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0099.004.md">T0099.004</a></td>
<td>Impersonate Existing Media Outlet</td>
<td>A situation where a threat actor styles their online assets or content to mimic an existing media outlet.
This can be done to take advantage of peoples trust in the outlet to increase narrative believability, to smear the outlet, or to make the outlet less trustworthy.</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0099.005.md">T0099.005</a></td>
<td>Impersonate Existing Official</td>
<td>A situation where a threat actor styles their online assets or content to impersonate an official (including government officials, organisation officials, etc).</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0099.006.md">T0099.006</a></td>
<td>Impersonate Existing Influencer</td>
<td>A situation where a threat actor styles their online assets or content to impersonate an influencer or celebrity, typically to exploit users existing faith in the impersonated target.</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0100.md">T0100</a></td>
<td>Co-Opt Trusted Sources</td>
<td>An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: - National or local new outlets - Research or academic publications - Online blogs or websites</td>
@ -993,8 +1051,12 @@
</tr>
<tr>
<td><a href="techniques/T0104.002.md">T0104.002</a></td>
<td>Dating Apps</td>
<td>Dating Apps</td>
<td>Dating App</td>
<td>“Dating App” refers to any platform (or platform feature) in which the ostensive purpose is for users to develop a physical/romantic relationship with other users.
Threat Actors can exploit users quest for love to trick them into doing things like revealing sensitive information or giving them money.
Examples include Tinder, Bumble, Grindr, Facebook Dating, Tantan, Badoo, Plenty of Fish, hinge, LOVOO, OkCupid, happn, and Mamba.</td>
<td>TA07</td>
</tr>
<tr>
@ -1115,7 +1177,7 @@
<td><a href="techniques/T0113.md">T0113</a></td>
<td>Employ Commercial Analytic Firms</td>
<td>Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences.</td>
<td>TA08</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0114.md">T0114</a></td>
@ -1771,4 +1833,42 @@
<td>Publish and/or propagate demeaning, derisive, or humiliating content targeting an individual or group of individuals with the intent to cause emotional, psychological, or physical distress. Hate speech can cause harm directly or incite others to harm the target. It often aims to stigmatise the target by singling out immutable characteristics such as colour, race, religion, national or ethnic origin, gender, gender identity, sexual orientation, age, disease, or mental or physical disability. Thus, promoting hatred online may involve racism, antisemitism, Islamophobia, xenophobia, sexism, misogyny, homophobia, transphobia, ageism, ableism, or any combination thereof. Motivations for hate speech range from group preservation to ideological superiority to the unbridled infliction of suffering. </td>
<td>TA02</td>
</tr>
<tr>
<td><a href="techniques/T0141.md">T0141</a></td>
<td>Acquire Compromised Asset</td>
<td>Threat Actors may take over existing assets not owned by them through nefarious means, such as using technical exploits, hacking, purchasing compromised accounts from the dark web, or social engineering.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0141.001.md">T0141.001</a></td>
<td>Acquire Compromised Account</td>
<td>Threat Actors can take over existing users accounts to distribute campaign content. 
The actor may maintain the assets previous identity to capitalise on the perceived legitimacy its previous owner had cultivated.
The actor may completely rebrand the account to exploit its existing reach, or relying on the accounts history to avoid more stringent automated content moderation rules applied to new accounts.
See also [Mitre ATT&CKs T1586 Compromise Accounts](https://attack.mitre.org/techniques/T1586/) for more technical information on how threat actors may achieve this objective.
This Technique was previously called Compromise Legitimate Accounts, and used the ID T0011.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0141.002.md">T0141.002</a></td>
<td>Acquire Compromised Website</td>
<td>Threat Actors may take over existing websites to publish or amplify inauthentic narratives. This includes the defacement of websites, and cases where websites personas are maintained to add credence to threat actors narratives.
See also [Mitre ATT&CKs T1584 Compromise Infrastructure](https://attack.mitre.org/techniques/T1584/) for more technical information on how threat actors may achieve this objective.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0142.md">T0142</a></td>
<td>Fabricate Grassroots Movement</td>
<td>This technique, sometimes known as "astroturfing", occurs when an influence operation disguises itself as a grassroots movement or organisation that supports operation narratives. 
Astroturfing aims to increase the appearance of popular support for an evolving grassroots movement in contrast to "Utilise Butterfly Attacks", which aims to discredit an existing grassroots movement. 
This Technique was previously called Astroturfing, and used the ID T0099.001</td>
<td>TA16</td>
</tr>
</table>