diff --git a/.DS_Store b/.DS_Store index acddcea..5b433ba 100644 Binary files a/.DS_Store and b/.DS_Store differ diff --git a/CODE/generate_DISARM_pages.ipynb b/CODE/generate_DISARM_pages.ipynb index 0fa1081..ff25246 100644 --- a/CODE/generate_DISARM_pages.ipynb +++ b/CODE/generate_DISARM_pages.ipynb @@ -18,7 +18,7 @@ }, { "cell_type": "code", - "execution_count": 1, + "execution_count": 3, "metadata": { "scrolled": true }, @@ -33,39 +33,292 @@ "updated ../generated_files/disarm_blue_framework_clickable.html\n", "Temp: objecttype phase\n", "updated ../generated_pages/phases_index.md\n", + "Updating ../generated_pages/phases/P04.md\n", "Temp: objecttype tactic\n", "updated ../generated_pages/tactics_index.md\n", + "Updating ../generated_pages/tactics/TA01.md\n", + "Updating ../generated_pages/tactics/TA02.md\n", + "Updating ../generated_pages/tactics/TA03.md\n", + "Updating ../generated_pages/tactics/TA04.md\n", + "Updating ../generated_pages/tactics/TA05.md\n", + "Updating ../generated_pages/tactics/TA06.md\n", + "Updating ../generated_pages/tactics/TA07.md\n", + "Updating ../generated_pages/tactics/TA08.md\n", "Updating ../generated_pages/tactics/TA09.md\n", + "Updating ../generated_pages/tactics/TA10.md\n", + "Updating ../generated_pages/tactics/TA11.md\n", + "Updating ../generated_pages/tactics/TA12.md\n", + "Updating ../generated_pages/tactics/TA13.md\n", + "Updating ../generated_pages/tactics/TA14.md\n", + "Updating ../generated_pages/tactics/TA15.md\n", + "Updating ../generated_pages/tactics/TA16.md\n", "Temp: objecttype technique\n", "updated ../generated_pages/techniques_index.md\n", + "Updating ../generated_pages/techniques/T0001.md\n", + "Updating ../generated_pages/techniques/T0002.md\n", + "Updating ../generated_pages/techniques/T0003.md\n", + "Updating ../generated_pages/techniques/T0004.md\n", + "Updating ../generated_pages/techniques/T0005.md\n", + "Updating ../generated_pages/techniques/T0006.md\n", + "Updating ../generated_pages/techniques/T0007.md\n", + "Updating ../generated_pages/techniques/T0008.md\n", + "Updating ../generated_pages/techniques/T0009.md\n", "Updating ../generated_pages/techniques/T0010.md\n", + "Updating ../generated_pages/techniques/T0011.md\n", + "Updating ../generated_pages/techniques/T0012.md\n", + "Updating ../generated_pages/techniques/T0013.md\n", + "Updating ../generated_pages/techniques/T0014.md\n", + "Updating ../generated_pages/techniques/T0015.md\n", + "Updating ../generated_pages/techniques/T0016.md\n", + "Updating ../generated_pages/techniques/T0017.md\n", + "Updating ../generated_pages/techniques/T0018.md\n", + "Updating ../generated_pages/techniques/T0019.md\n", + "Updating ../generated_pages/techniques/T0020.md\n", + "Updating ../generated_pages/techniques/T0021.md\n", "Updating ../generated_pages/techniques/T0022.md\n", + "Updating ../generated_pages/techniques/T0023.md\n", + "Updating ../generated_pages/techniques/T0024.md\n", "Updating ../generated_pages/techniques/T0025.md\n", + "Updating ../generated_pages/techniques/T0026.md\n", "Updating ../generated_pages/techniques/T0027.md\n", + "Updating ../generated_pages/techniques/T0028.md\n", + "Updating ../generated_pages/techniques/T0029.md\n", + "Updating ../generated_pages/techniques/T0030.md\n", + "Updating ../generated_pages/techniques/T0031.md\n", + "Updating ../generated_pages/techniques/T0032.md\n", + "Updating ../generated_pages/techniques/T0033.md\n", + "Updating ../generated_pages/techniques/T0034.md\n", + "Updating ../generated_pages/techniques/T0035.md\n", + "Updating ../generated_pages/techniques/T0036.md\n", + "Updating ../generated_pages/techniques/T0037.md\n", + "Updating ../generated_pages/techniques/T0038.md\n", + "Updating ../generated_pages/techniques/T0039.md\n", + "Updating ../generated_pages/techniques/T0040.md\n", + "Updating ../generated_pages/techniques/T0041.md\n", + "Updating ../generated_pages/techniques/T0042.md\n", + "Updating ../generated_pages/techniques/T0043.md\n", + "Updating ../generated_pages/techniques/T0044.md\n", "Updating ../generated_pages/techniques/T0045.md\n", + "Updating ../generated_pages/techniques/T0046.md\n", + "Updating ../generated_pages/techniques/T0047.md\n", + "Updating ../generated_pages/techniques/T0048.md\n", + "Updating ../generated_pages/techniques/T0049.md\n", + "Updating ../generated_pages/techniques/T0050.md\n", + "Updating ../generated_pages/techniques/T0051.md\n", + "Updating ../generated_pages/techniques/T0052.md\n", + "Updating ../generated_pages/techniques/T0053.md\n", + "Updating ../generated_pages/techniques/T0054.md\n", + "Updating ../generated_pages/techniques/T0055.md\n", + "Updating ../generated_pages/techniques/T0056.md\n", + "Updating ../generated_pages/techniques/T0057.md\n", + "Updating ../generated_pages/techniques/T0058.md\n", + "Updating ../generated_pages/techniques/T0059.md\n", + "Updating ../generated_pages/techniques/T0060.md\n", + "Updating ../generated_pages/techniques/T0061.md\n", + "Updating ../generated_pages/techniques/T0062.md\n", + "Updating ../generated_pages/techniques/T0063.md\n", + "Updating ../generated_pages/techniques/T0064.md\n", + "Updating ../generated_pages/techniques/T0065.md\n", + "Updating ../generated_pages/techniques/T0066.md\n", + "Updating ../generated_pages/techniques/T0067.md\n", + "Updating ../generated_pages/techniques/T0068.md\n", + "Updating ../generated_pages/techniques/T0069.md\n", + "Updating ../generated_pages/techniques/T0070.md\n", + "Updating ../generated_pages/techniques/T0071.md\n", + "Updating ../generated_pages/techniques/T0072.md\n", + "Updating ../generated_pages/techniques/T0073.md\n", + "Updating ../generated_pages/techniques/T0074.md\n", + "Updating ../generated_pages/techniques/T0075.md\n", + "Updating ../generated_pages/techniques/T0076.md\n", + "Updating ../generated_pages/techniques/T0077.md\n", + "Updating ../generated_pages/techniques/T0078.md\n", + "Updating ../generated_pages/techniques/T0079.md\n", + "Updating ../generated_pages/techniques/T0080.md\n", + "Updating ../generated_pages/techniques/T0081.md\n", + "Updating ../generated_pages/techniques/T0082.md\n", + "Updating ../generated_pages/techniques/T0083.md\n", + "Updating ../generated_pages/techniques/T0084.md\n", + "Updating ../generated_pages/techniques/T0085.md\n", + "Updating ../generated_pages/techniques/T0086.md\n", + "Updating ../generated_pages/techniques/T0087.md\n", + "Updating ../generated_pages/techniques/T0088.md\n", + "Updating ../generated_pages/techniques/T0089.md\n", + "Updating ../generated_pages/techniques/T0090.md\n", + "Updating ../generated_pages/techniques/T0091.md\n", + "Updating ../generated_pages/techniques/T0092.md\n", + "Updating ../generated_pages/techniques/T0093.md\n", + "Updating ../generated_pages/techniques/T0094.md\n", + "Updating ../generated_pages/techniques/T0095.md\n", + "Updating ../generated_pages/techniques/T0096.md\n", + "Updating ../generated_pages/techniques/T0097.md\n", "Temp: objecttype task\n", "updated ../generated_pages/tasks_index.md\n", "Temp: objecttype incident\n", "updated ../generated_pages/incidents_index.md\n", + "Updating ../generated_pages/incidents/I00002.md\n", + "Updating ../generated_pages/incidents/I00005.md\n", + "Updating ../generated_pages/incidents/I00006.md\n", + "Updating ../generated_pages/incidents/I00007.md\n", + "Updating ../generated_pages/incidents/I00009.md\n", + "Updating ../generated_pages/incidents/I00010.md\n", + "Updating ../generated_pages/incidents/I00015.md\n", + "Updating ../generated_pages/incidents/I00017.md\n", + "Updating ../generated_pages/incidents/I00022.md\n", + "Updating ../generated_pages/incidents/I00029.md\n", + "Updating ../generated_pages/incidents/I00032.md\n", + "Updating ../generated_pages/incidents/I00033.md\n", + "Updating ../generated_pages/incidents/I00034.md\n", + "Updating ../generated_pages/incidents/I00042.md\n", + "Updating ../generated_pages/incidents/I00044.md\n", + "Updating ../generated_pages/incidents/I00047.md\n", + "Updating ../generated_pages/incidents/I00049.md\n", + "Updating ../generated_pages/incidents/I00050.md\n", + "Updating ../generated_pages/incidents/I00051.md\n", + "Updating ../generated_pages/incidents/I00053.md\n", + "Updating ../generated_pages/incidents/I00056.md\n", + "Updating ../generated_pages/incidents/I00063.md\n", "Temp: objecttype counter\n", - "updated ../generated_pages/counters_index.md\n" + "updated ../generated_pages/counters_index.md\n", + "Updating ../generated_pages/counters/C00006.md\n", + "Updating ../generated_pages/counters/C00008.md\n", + "Updating ../generated_pages/counters/C00009.md\n", + "Updating ../generated_pages/counters/C00010.md\n", + "Updating ../generated_pages/counters/C00011.md\n", + "Updating ../generated_pages/counters/C00012.md\n", + "Updating ../generated_pages/counters/C00013.md\n", + "Updating ../generated_pages/counters/C00014.md\n", + "Updating ../generated_pages/counters/C00016.md\n", + "Updating ../generated_pages/counters/C00017.md\n", + "Updating ../generated_pages/counters/C00019.md\n", + "Updating ../generated_pages/counters/C00021.md\n", + "Updating ../generated_pages/counters/C00022.md\n", + "Updating ../generated_pages/counters/C00024.md\n", + "Updating ../generated_pages/counters/C00026.md\n", + "Updating ../generated_pages/counters/C00027.md\n", + "Updating ../generated_pages/counters/C00029.md\n", + "Updating ../generated_pages/counters/C00030.md\n", + "Updating ../generated_pages/counters/C00031.md\n", + "Updating ../generated_pages/counters/C00032.md\n", + "Updating ../generated_pages/counters/C00034.md\n", + "Updating ../generated_pages/counters/C00036.md\n", + "Updating ../generated_pages/counters/C00040.md\n", + "Updating ../generated_pages/counters/C00042.md\n", + "Updating ../generated_pages/counters/C00044.md\n", + "Updating ../generated_pages/counters/C00046.md\n", + "Updating ../generated_pages/counters/C00047.md\n", + "Updating ../generated_pages/counters/C00048.md\n", + "Updating ../generated_pages/counters/C00051.md\n", + "Updating ../generated_pages/counters/C00052.md\n", + "Updating ../generated_pages/counters/C00053.md\n" ] }, { - "ename": "KeyError", - "evalue": "\"['sector_ids'] not in index\"", - "output_type": "error", - "traceback": [ - "\u001b[0;31m---------------------------------------------------------------------------\u001b[0m", - "\u001b[0;31mKeyError\u001b[0m Traceback (most recent call last)", - "\u001b[0;32m\u001b[0m in \u001b[0;36m\u001b[0;34m\u001b[0m\n\u001b[1;32m 2\u001b[0m \u001b[0;32mfrom\u001b[0m \u001b[0mgenerate_DISARM_pages\u001b[0m \u001b[0;32mimport\u001b[0m \u001b[0mDisarm\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 3\u001b[0m \u001b[0mdisarm\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0mDisarm\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0;32m----> 4\u001b[0;31m \u001b[0mdisarm\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mgenerate_and_write_datafiles\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0m", - "\u001b[0;32m~/Dropbox/SJT_Projects_current/DISARM_foundation/code_repositories/DISARMframeworks/CODE/generate_DISARM_pages.py\u001b[0m in \u001b[0;36mgenerate_and_write_datafiles\u001b[0;34m(self)\u001b[0m\n\u001b[1;32m 776\u001b[0m \u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mwrite_disarm_frameworks\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 777\u001b[0m \u001b[0;31m# Editable files\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0;32m--> 778\u001b[0;31m \u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mupdate_markdown_files\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0m\u001b[1;32m 779\u001b[0m \u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mwrite_object_indexes_to_file\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 780\u001b[0m \u001b[0;31m# Cross tables\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n", - "\u001b[0;32m~/Dropbox/SJT_Projects_current/DISARM_foundation/code_repositories/DISARMframeworks/CODE/generate_DISARM_pages.py\u001b[0m in \u001b[0;36mupdate_markdown_files\u001b[0;34m(self)\u001b[0m\n\u001b[1;32m 476\u001b[0m \u001b[0mtactic\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0mrow\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'tactic_id'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0msummary\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0mrow\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'summary'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m,\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 477\u001b[0m \u001b[0mplaybooks\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0;34m''\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mmetatechnique\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0mrow\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'metatechnique'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m,\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0;32m--> 478\u001b[0;31m \u001b[0mactortypes\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mcreate_counter_actortypes_string\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mrow\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'disarm_id'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m,\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0m\u001b[1;32m 479\u001b[0m \u001b[0mresources_needed\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0mrow\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'resources_needed'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m,\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 480\u001b[0m \u001b[0mtactics\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mcreate_counter_tactics_string\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mrow\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'disarm_id'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m,\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n", - "\u001b[0;32m~/Dropbox/SJT_Projects_current/DISARM_foundation/code_repositories/DISARMframeworks/CODE/generate_DISARM_pages.py\u001b[0m in \u001b[0;36mcreate_counter_actortypes_string\u001b[0;34m(self, counter_id)\u001b[0m\n\u001b[1;32m 275\u001b[0m '''\n\u001b[1;32m 276\u001b[0m \u001b[0mcounter_actortypes\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mcross_counterid_actortypeid\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mcross_counterid_actortypeid\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'disarm_id'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m==\u001b[0m\u001b[0mcounter_id\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0;32m--> 277\u001b[0;31m \u001b[0mcounter_actortypes\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0mpd\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mmerge\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mcounter_actortypes\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mdf_actortypes\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;34m'disarm_id'\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0;34m'name'\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0;34m'sector_ids'\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mleft_on\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0;34m'actortype_id'\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mright_on\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0;34m'disarm_id'\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0m\u001b[1;32m 278\u001b[0m \u001b[0mrow_string\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0;34m'| [{0} {1}]({2}actortypes/{0}.md) | {3} |\\n'\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 279\u001b[0m \u001b[0;32mfor\u001b[0m \u001b[0mindex\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mrow\u001b[0m \u001b[0;32min\u001b[0m \u001b[0mcounter_actortypes\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0msort_values\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34m'actortype_id'\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0miterrows\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m:\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n", - "\u001b[0;32m~/opt/anaconda3/lib/python3.8/site-packages/pandas/core/frame.py\u001b[0m in \u001b[0;36m__getitem__\u001b[0;34m(self, key)\u001b[0m\n\u001b[1;32m 2804\u001b[0m \u001b[0;32mif\u001b[0m \u001b[0mis_iterator\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mkey\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m:\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 2805\u001b[0m \u001b[0mkey\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0mlist\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mkey\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0;32m-> 2806\u001b[0;31m \u001b[0mindexer\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mloc\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0m_get_listlike_indexer\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mkey\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0maxis\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0;36m1\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mraise_missing\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0;32mTrue\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m[\u001b[0m\u001b[0;36m1\u001b[0m\u001b[0;34m]\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0m\u001b[1;32m 2807\u001b[0m \u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 2808\u001b[0m \u001b[0;31m# take() does not accept boolean indexers\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n", - "\u001b[0;32m~/opt/anaconda3/lib/python3.8/site-packages/pandas/core/indexing.py\u001b[0m in \u001b[0;36m_get_listlike_indexer\u001b[0;34m(self, key, axis, raise_missing)\u001b[0m\n\u001b[1;32m 1550\u001b[0m \u001b[0mkeyarr\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mindexer\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mnew_indexer\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0max\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0m_reindex_non_unique\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mkeyarr\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 1551\u001b[0m \u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0;32m-> 1552\u001b[0;31m self._validate_read_indexer(\n\u001b[0m\u001b[1;32m 1553\u001b[0m \u001b[0mkeyarr\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mindexer\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mo\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0m_get_axis_number\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0maxis\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m,\u001b[0m \u001b[0mraise_missing\u001b[0m\u001b[0;34m=\u001b[0m\u001b[0mraise_missing\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 1554\u001b[0m )\n", - "\u001b[0;32m~/opt/anaconda3/lib/python3.8/site-packages/pandas/core/indexing.py\u001b[0m in \u001b[0;36m_validate_read_indexer\u001b[0;34m(self, key, indexer, axis, raise_missing)\u001b[0m\n\u001b[1;32m 1644\u001b[0m \u001b[0;32mif\u001b[0m \u001b[0;32mnot\u001b[0m \u001b[0;34m(\u001b[0m\u001b[0mself\u001b[0m\u001b[0;34m.\u001b[0m\u001b[0mname\u001b[0m \u001b[0;34m==\u001b[0m \u001b[0;34m\"loc\"\u001b[0m \u001b[0;32mand\u001b[0m \u001b[0;32mnot\u001b[0m \u001b[0mraise_missing\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m:\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 1645\u001b[0m \u001b[0mnot_found\u001b[0m \u001b[0;34m=\u001b[0m \u001b[0mlist\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mset\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0mkey\u001b[0m\u001b[0;34m)\u001b[0m \u001b[0;34m-\u001b[0m \u001b[0mset\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0max\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0;32m-> 1646\u001b[0;31m \u001b[0;32mraise\u001b[0m \u001b[0mKeyError\u001b[0m\u001b[0;34m(\u001b[0m\u001b[0;34mf\"{not_found} not in index\"\u001b[0m\u001b[0;34m)\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n\u001b[0m\u001b[1;32m 1647\u001b[0m \u001b[0;34m\u001b[0m\u001b[0m\n\u001b[1;32m 1648\u001b[0m \u001b[0;31m# we skip the warning on Categorical/Interval\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0;34m\u001b[0m\u001b[0m\n", - "\u001b[0;31mKeyError\u001b[0m: \"['sector_ids'] not in index\"" + "name": "stdout", + "output_type": "stream", + "text": [ + "Updating ../generated_pages/counters/C00058.md\n", + "Updating ../generated_pages/counters/C00059.md\n", + "Updating ../generated_pages/counters/C00060.md\n", + "Updating ../generated_pages/counters/C00065.md\n", + "Updating ../generated_pages/counters/C00066.md\n", + "Updating ../generated_pages/counters/C00067.md\n", + "Updating ../generated_pages/counters/C00070.md\n", + "Updating ../generated_pages/counters/C00071.md\n", + "Updating ../generated_pages/counters/C00072.md\n", + "Updating ../generated_pages/counters/C00073.md\n", + "Updating ../generated_pages/counters/C00074.md\n", + "Updating ../generated_pages/counters/C00076.md\n", + "Updating ../generated_pages/counters/C00078.md\n", + "Updating ../generated_pages/counters/C00080.md\n", + "Updating ../generated_pages/counters/C00081.md\n", + "Updating ../generated_pages/counters/C00082.md\n", + "Updating ../generated_pages/counters/C00084.md\n", + "Updating ../generated_pages/counters/C00085.md\n", + "Updating ../generated_pages/counters/C00086.md\n", + "Updating ../generated_pages/counters/C00087.md\n", + "Updating ../generated_pages/counters/C00090.md\n", + "Updating ../generated_pages/counters/C00091.md\n", + "Updating ../generated_pages/counters/C00092.md\n", + "Updating ../generated_pages/counters/C00093.md\n", + "Updating ../generated_pages/counters/C00094.md\n", + "Updating ../generated_pages/counters/C00096.md\n", + "Updating ../generated_pages/counters/C00097.md\n", + "Updating ../generated_pages/counters/C00098.md\n", + "Updating ../generated_pages/counters/C00099.md\n", + "Updating ../generated_pages/counters/C00100.md\n", + "Updating ../generated_pages/counters/C00101.md\n", + "Updating ../generated_pages/counters/C00103.md\n", + "Updating ../generated_pages/counters/C00105.md\n", + "Updating ../generated_pages/counters/C00106.md\n", + "Updating ../generated_pages/counters/C00107.md\n", + "Updating ../generated_pages/counters/C00111.md\n", + "Updating ../generated_pages/counters/C00112.md\n", + "Updating ../generated_pages/counters/C00113.md\n", + "Updating ../generated_pages/counters/C00114.md\n", + "Updating ../generated_pages/counters/C00115.md\n", + "Updating ../generated_pages/counters/C00116.md\n", + "Updating ../generated_pages/counters/C00117.md\n", + "Updating ../generated_pages/counters/C00118.md\n", + "Updating ../generated_pages/counters/C00119.md\n", + "Updating ../generated_pages/counters/C00120.md\n", + "Updating ../generated_pages/counters/C00121.md\n", + "Updating ../generated_pages/counters/C00122.md\n", + "Updating ../generated_pages/counters/C00123.md\n", + "Updating ../generated_pages/counters/C00124.md\n", + "Updating ../generated_pages/counters/C00125.md\n", + "Updating ../generated_pages/counters/C00126.md\n", + "Updating ../generated_pages/counters/C00128.md\n", + "Updating ../generated_pages/counters/C00129.md\n", + "Updating ../generated_pages/counters/C00130.md\n", + "Updating ../generated_pages/counters/C00131.md\n", + "Updating ../generated_pages/counters/C00133.md\n", + "Updating ../generated_pages/counters/C00135.md\n", + "Updating ../generated_pages/counters/C00136.md\n", + "Updating ../generated_pages/counters/C00138.md\n", + "Updating ../generated_pages/counters/C00142.md\n", + "Updating ../generated_pages/counters/C00143.md\n", + "Updating ../generated_pages/counters/C00144.md\n", + "Updating ../generated_pages/counters/C00147.md\n", + "Updating ../generated_pages/counters/C00148.md\n", + "Updating ../generated_pages/counters/C00149.md\n", + "Updating ../generated_pages/counters/C00153.md\n", + "Updating ../generated_pages/counters/C00154.md\n", + "Updating ../generated_pages/counters/C00155.md\n", + "Updating ../generated_pages/counters/C00156.md\n", + "Updating ../generated_pages/counters/C00160.md\n", + "Updating ../generated_pages/counters/C00161.md\n", + "Updating ../generated_pages/counters/C00162.md\n", + "Updating ../generated_pages/counters/C00164.md\n", + "Updating ../generated_pages/counters/C00165.md\n", + "Updating ../generated_pages/counters/C00169.md\n", + "Updating ../generated_pages/counters/C00172.md\n", + "Updating ../generated_pages/counters/C00174.md\n", + "Updating ../generated_pages/counters/C00176.md\n", + "Updating ../generated_pages/counters/C00178.md\n", + "Updating ../generated_pages/counters/C00182.md\n", + "Updating ../generated_pages/counters/C00184.md\n", + "Updating ../generated_pages/counters/C00188.md\n", + "Updating ../generated_pages/counters/C00189.md\n", + "Updating ../generated_pages/counters/C00190.md\n", + "Updating ../generated_pages/counters/C00195.md\n", + "Updating ../generated_pages/counters/C00197.md\n", + "Updating ../generated_pages/counters/C00200.md\n", + "Updating ../generated_pages/counters/C00202.md\n", + "Updating ../generated_pages/counters/C00203.md\n", + "Updating ../generated_pages/counters/C00205.md\n", + "Updating ../generated_pages/counters/C00207.md\n", + "Updating ../generated_pages/counters/C00211.md\n", + "Updating ../generated_pages/counters/C00212.md\n", + "Updating ../generated_pages/counters/C00216.md\n", + "Updating ../generated_pages/counters/C00219.md\n", + "Temp: objecttype metatechnique\n", + "updated ../generated_pages/metatechniques_index.md\n", + "Temp: objecttype actortype\n", + "updated ../generated_pages/actortypes_index.md\n", + "updated ../generated_pages/responsetype_index.md\n", + "updated ../generated_pages/detections_index.md\n", + "updated ../generated_pages/tactics_by_responsetype_table.md\n", + "updated ../generated_pages/metatechniques_by_responsetype_table.md\n" ] } ], diff --git a/CODE/temp_techs.csv b/CODE/temp_techs.csv deleted file mode 100644 index 69b6abb..0000000 --- a/CODE/temp_techs.csv +++ /dev/null @@ -1,104 +0,0 @@ -DISARM Technique,DISARM Subtechnique,Description,DISARM ID -Determine Target Audiences,,,T0001 -Determine Strategic Ends,,,T0002 -Dismiss,,Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased.,T0003 -Distort,,"Twist the narrative. Take information, or artifacts like images, and change the framing around them.",T0004 -Distract,,"Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they’ve accused you of (e.g. police brutality).",T0005 -Dismay,,"Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story.",T0006 -Divide,,"Create conflict between subgroups, to widen divisions in a community",T0007 -Degrade Adversary,,Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation.,T0008 -Facilitate State Propaganda,,Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda.,T0009 -Map Target Audience Information Environment,,"Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.",T0010 -Identify Social and Technical Vulnerabilities,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Segment Audiences,,"Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. ",T0013 -Develop New Narratives,,,T0014 -Leverage Existing Narratives,,"Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. ",T0015 -Develop Competing Narratives,,"Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the ""firehose of misinformation"" approach.",T0016 -Leverage Conspiracy Theory Narratives,,"""Conspiracy narratives"" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the ""firehose of falsehoods"" model. ",T0017 -Integrate Target Audience Vulnerabilities into Narrative,,"An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment.",T0018 -Respond to Breaking News Event or Active Crisis,,"Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. ",T0019 -Demand insurmountable proof,,"Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the ""firehose of misinformation"". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of ""questions"" while the truth teller is burdened with higher and higher standards of proof.",T0020 -Reuse Existing Content,,When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. ,T0021 -Develop Text-based Content,,,T0022 -Develop Image-based Content,,,T0023 -Develop Video-based Content,,,T0024 -Develop Audio-based Content,,,T0025 -Generate information pollution,,"Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. ""Nothing is true, but everything is possible."" Akin to astroturfing campaign.",T0026 -Distort facts,,"Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content",T0027 -Create hashtags and search artifacts,,"Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only ""real"" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage ""conversation"" connected to launching new incident/campaign with new hashtag for applicable social media sites). ",T0028 -Obtain Private Documents,,,T0029 -Create Inauthentic Accounts,,,T0030 -Recruit bad actors,,,T0031 -Cultivate ignorant agents,,"Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as ""useful idiots"" or ""unwitting agents"".",T0032 -Build Network,,,T0033 -Acquire/ recruit Network,,,T0034 -Infiltrate Existing Networks,,,T0035 -Create Inauthentic Social Media Pages and Groups,,"Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are.",T0036 -Create inauthentic websites,,"Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations.",T0037 -Prepare Physical Broadcast Capabilities,,"Create or coopt broadcast capabilities (e.g. TV, radio etc).",T0038 -Develop Owned Media Assets,,"An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content.",T0039 -Prepare fundraising campaigns,,"Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. ",T0040 -Leverage Content Farm,,,T0041 -Compromise legitimate accounts,,Hack or take over legimate accounts to distribute misinformation or damaging content.,T0042 -Create fake experts,,"Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. ",T0043 -Create personas,,,T0044 -Establish Inauthentic News Sites,,"Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.",T0045 -Prepare Assets Impersonating Legitimate Entities,,"An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. -An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. ",T0046 -Co-opt Trusted Sources,,"An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: -- National or local new outlets -- Research or academic publications -- Online blogs or websites ",T0047 -Create Clickbait,,"Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset.",T0048 -Purchase Targeted Advertisements,,Create or fund advertisements targeted at specific populations,T0049 -Create Localized Content,,"Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution.",T0050 -Leverage Echo Chambers/Filter Bubbles,,"An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. ",T0051 -Chat apps,,"Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.",T0052 -Livestream,,,T0053 - Social Networks,,,T0054 -Media Sharing Networks,,"Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.",T0055 -Discussion Forums,,"Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc.",T0056 -Bookmarking and Content Curation,,"Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc.",T0057 -Blogging and Publishing Networks,,"Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. ",T0058 -Consumer Review Networks,,"Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc.",T0059 -Online polls,,"Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well",T0060 -Formal Diplomatic Channels,,,T0061 -Traditional Media,,"Examples include TV, Newspaper, Radio, etc.",T0062 -Email,,,T0063 -Trial content,,"Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates",T0064 -Bait legitimate influencers,,"Credibility in a social media environment is often a function of the size of a user's network. ""Influencers"" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.",T0065 -Seed Kernel of truth,,"Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters.",T0066 -Seed distortions,,"Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. ",T0067 -Use fake experts,,"Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give ""credility"" to misinformation. Take advantage of credential bias",T0068 -Use Search Engine Optimization,,"Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka ""Black-hat SEO"" ",T0069 -Employ Commercial Analytic Firms,,"Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. ",T0070 -Deliver Ads,,Delivering content via any form of paid media or advertising.,T0071 -Post Content,,Delivering content by posting via owned media (assets that the operator controls). ,T0072 -Comment or Reply on Content,,Delivering content by replying or commenting via owned media (assets that the operator controls). ,T0073 -Attract Traditional Media,,Deliver content by attracting the attention of traditional media (earned media).,T0074 -Flooding the Information Space,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0075 -Amplify Existing Narrative,,An influence operation may amplify existing narratives that align with its narratives to support operation objectives. ,T0076 -Cross-Posting,,"Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. ",T0077 -Incentivize Sharing,,"Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.",T0078 -Manipulate Platform Algorithm,,"Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. ",T0079 -Direct Users to Alternative Platforms,,"Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. ",T0080 -Harass,,"Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. ",T0081 -Censor social media as a political force,,Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports).,T0082 -Control Information Environment through Offensive Cyberspace Operations,,Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.,T0083 -Suppress Opposition,,,T0084 -Platform Filtering,,Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation),T0085 -Encourage Attendance at Events,,Operation encourages attendance at existing real world event.,T0086 -Organize Events,,"Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.",T0087 -Conduct fundraising,,"Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. ",T0088 -Physical Violence,,"Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. ",T0089 -Merchandising/ Advertising,,Merchandising/Advertising refers to getting the message or narrative into physical space in the offline world,T0090 -Conceal People,,Conceal the identity or provenance of the account and people assets.,T0091 -Conceal Operational Activity,,,T0092 -Conceal Infrastructure,,,T0093 -Exploit TOS/Content Moderation,,,T0094 -Play the long game,,Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative.,T0095 -Measure Performance,,,T0096 -Measure Effectiveness,,,T0097 -Measure Effectiveness Indicators (or KPIs),,, diff --git a/CODE/tmp_subs.csv b/CODE/tmp_subs.csv deleted file mode 100644 index 8344265..0000000 --- a/CODE/tmp_subs.csv +++ /dev/null @@ -1,200 +0,0 @@ -DISARM Subtechnique_x,DISARM Technique,Description_x,DISARM ID_x,DISARM Subtechnique_y,Description_y,DISARM ID_y -Discredit Credible Sources,Dismiss,"Plan to delegitimize the media landscape and degrade public trust in reporting, by discrediting credible sources. This makes it easier to promote influence operation content.",ST0001,,Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased.,T0003 -Monitor Social Media Analytics,Map Target Audience Information Environment,"An influence operation may use social media analytics to determine which factors will increase the operation content’s exposure to its target audience on social media platforms, including views, interactions, and sentiment relating to topics and content types. The social media platform itself or a third-party tool may collect the metrics. ",ST0002,,"Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.",T0010 -Evaluate Media Surveys,Map Target Audience Information Environment,"An influence operation may evaluate its own or third-party media surveys to determine what type of content appeals to its target audience. Media surveys may provide insight into an audience’s political views, social class, general interests, or other indicators used to tailor operation messaging to its target audience.",ST0003,,"Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.",T0010 -Identify Trending Topics/Hashtags,Map Target Audience Information Environment,An influence operation may identify trending hashtags on social media platforms for later use in boosting operation content. A hashtag40 refers to a word or phrase preceded by the hash symbol (#) on social media used to identify messages and posts relating to a specific topic. All public posts that use the same hashtag are aggregated onto a centralized page dedicated to the word or phrase and sorted either chronologically or by popularity. ,ST0004,,"Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.",T0010 -Conduct Web Traffic Analysis,Map Target Audience Information Environment,"An influence operation may conduct web traffic analysis to determine which search engines, keywords, websites, and advertisements gain the most traction with its target audience.",ST0005,,"Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.",T0010 -Assess Degree/Type of Media Access,Map Target Audience Information Environment,"An influence operation may survey a target audience’s Internet availability and degree of media freedom to determine which target audience members will have access to operation content and on which platforms. An operation may face more difficulty targeting an information environment with heavy restrictions and media control than an environment with independent media, freedom of speech and of the press, and individual liberties. ",ST0006,,"Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.",T0010 -Find Echo Chambers,Identify Social and Technical Vulnerabilities,"Find or plan to create areas (social media groups, search term groups, hashtag groups etc) where individuals only engage with people they agree with. ",ST0007,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Identify Data Voids,Identify Social and Technical Vulnerabilities,"A data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. -A 2019 report by Michael Golebiewski identifies five types of data voids. (1) “Breaking news” data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a “strategic new terms” data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on “outdated terms” that have decreased in popularity, capitalizing on most search engines’ preferences for recency. (4) “Fragmented concepts” data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use “problematic queries” that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term. ",ST0008,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Identify Existing Prejudices,Identify Social and Technical Vulnerabilities,"An influence operation may exploit existing racial, religious, demographic, or social prejudices to further polarize its target audience from the rest of the public.",ST0009,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Identify Existing Fissures,Identify Social and Technical Vulnerabilities,"An influence operation may identify existing fissures to pit target populations against one another or facilitate a “divide-and-conquer"" approach to tailor operation narratives along the divides.",ST0010,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Identify Existing Conspiracy Narratives/Suspicions,Identify Social and Technical Vulnerabilities,An influence operation may assess preexisting conspiracy theories or suspicions in a population to identify existing narratives that support operational objectives. ,ST0011,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Identify Wedge Issues,Identify Social and Technical Vulnerabilities,"A wedge issue is a divisive political issue, usually concerning a social phenomenon, that divides individuals along a defined line. An influence operation may exploit wedge issues by intentionally polarizing the public along the wedge issue line and encouraging opposition between factions.",ST0012,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Identify Target Audience Adversaries,Identify Social and Technical Vulnerabilities,"An influence operation may identify or create a real or imaginary adversary to center operation narratives against. A real adversary may include certain politicians or political parties while imaginary adversaries may include falsified “deep state”62 actors that, according to conspiracies, run the state behind public view. ",ST0013,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Identify Media System Vulnerabilities,Identify Social and Technical Vulnerabilities,"An influence operation may exploit existing weaknesses in a target’s media system. These weaknesses may include existing biases among media agencies, vulnerability to false news agencies on social media, or existing distrust of traditional media sources. An existing distrust among the public in the media system’s credibility holds high potential for exploitation by an influence operation when establishing alternative news agencies to spread operation content. ",ST0014,,"Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",T0011 -Geographic Segmentation,Segment Audiences,"An influence operation may target populations in a specific geographic location, such as a region, state, or city. An influence operation may use geographic segmentation to Create Localized Content (see: Establish Legitimacy). ",ST0015,,"Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. ",T0012 -Demographic Segmentation,Segment Audiences,"An influence operation may target populations based on demographic segmentation, including age, gender, and income. Demographic segmentation may be useful for influence operations aiming to change state policies that affect a specific population sector. For example, an influence operation attempting to influence Medicare funding in the United States would likely target U.S. voters over 65 years of age. ",ST0016,,"Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. ",T0012 -Economic Segmentation,Segment Audiences,"An influence operation may target populations based on their income bracket, wealth, or other financial or economic division. ",ST0017,,"Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. ",T0012 -Psychographic Segmentation,Segment Audiences,"An influence operation may target populations based on psychographic segmentation, which uses audience values and decision-making processes. An operation may individually gather psychographic data with its own surveys or collection tools or externally purchase data from social media companies or online surveys, such as personality quizzes. ",ST0018,,"Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. ",T0012 -Political Segmentation,Segment Audiences,"An influence operation may target populations based on their political affiliations, especially when aiming to manipulate voting or change policy.",ST0019,,"Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. ",T0012 -Amplify Existing Conspiracy Theory Narrative,Leverage Conspiracy Theory Narratives,,ST0020,,"""Conspiracy narratives"" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the ""firehose of falsehoods"" model. ",T0016 -Develop Original Conspiracy Theory Narratives,Leverage Conspiracy Theory Narratives,,ST0021,,"""Conspiracy narratives"" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the ""firehose of falsehoods"" model. ",T0016 -Use Copypasta,Reuse Existing Content,"Copypasta refers to a piece of text that has been copied and pasted multiple times across various online platforms. A copypasta’s final form may differ from its original source text as users add, delete, or otherwise edit the content as they repost the text. ",ST0022,,When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. ,T0020 -Plagiarize Content,Reuse Existing Content,,ST0023,,When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. ,T0020 -Deceptively Labeled or Translated,Reuse Existing Content,,ST0024,,When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. ,T0020 -Appropriate Content,Reuse Existing Content,,ST0025,,When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. ,T0020 -Develop AI-Generated Text,Develop Text-based Content,"AI-generated texts refers to synthetic text composed by computers using text-generating AI technology. Autonomous generation refers to content created by a bot without human input, also known as bot-created content generation. Autonomous generation represents the next step in automation after language generation and may lead to automated journalism. An influence operation may use read fakes or autonomous generation to quickly develop and distribute content to the target audience.",ST0026,,,T0021 -Develop False or Altered Documents,Develop Text-based Content,,ST0027,,,T0021 -Develop Inauthentic News Articles,Develop Text-based Content,,ST0028,,,T0021 -Develop Memes,Develop Image-based Content,"Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.",ST0029,,,T0022 -Develop AI-Generated Images (Deepfakes),Develop Image-based Content,"Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual’s face, body, voice, and physical gestures.",ST0030,,,T0022 -Deceptively Edit Image (Cheap fakes),Develop Image-based Content,"Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.",ST0031,,,T0022 -Aggregate Information into Evidence Collages,Develop Image-based Content,image files that aggregate positive evidence (Joan Donovan),ST0032,,,T0022 - Develop AI-Generated Videos (Deepfakes),Develop Video-based Content,"Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual’s face, body, voice, and physical gestures.",ST0033,,,T0023 -Deceptively Edit Video (Cheap fakes),Develop Video-based Content,"Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.",ST0034,,,T0023 -Develop AI-Generated Audio (Deepfakes),Develop Audio-based Content,"Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual’s face, body, voice, and physical gestures.",ST0035,,,T0024 -Deceptively Edit Audio (Cheap fakes),Develop Audio-based Content,"Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.",ST0036,,,T0024 -Create fake research,Generate information pollution,"Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx",ST0037,,"Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. ""Nothing is true, but everything is possible."" Akin to astroturfing campaign.",T0025 -Hijack Hashtags,Generate information pollution,,ST0038,,"Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. ""Nothing is true, but everything is possible."" Akin to astroturfing campaign.",T0025 -Reframe Context,Distort facts,"Reframing context refers to removing an event from its surrounding context to distort its intended meaning. Rather than deny that an event occurred, reframing context frames an event in a manner that may lead the target audience to draw a different conclusion about its intentions. ",ST0039,,"Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content",T0026 -Edit Open-Source Content,Distort facts,"An influence operation may edit open-source content, such as collaborative blogs or encyclopedias, to promote its narratives on outlets with existing credibility and audiences. Editing open-source content may allow an operation to post content on platforms without dedicating resources to the creation and maintenance of its own assets. ",ST0040,,"Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content",T0026 -Leak Authentic Documents,Obtain Private Documents,,ST0041,,,T0028 -Leak False Documents,Obtain Private Documents,,ST0042,,,T0028 -Leak Altered Documents,Obtain Private Documents,"Obtain documents (eg by theft or leak), then alter and release, possibly among factual documents/sources.",ST0043,,,T0028 -Create Anonymous Accounts,Create Inauthentic Accounts,Anonymous accounts or anonymous users refer to users that access network resources without providing a username or password. An influence operation may use anonymous accounts to spread content without direct attribution to the operation. ,ST0044,,,T0029 -Create Cyborg Accounts,Create Inauthentic Accounts,"Cyborg accounts refer to partly manned, partly automated social media accounts. Cyborg accounts primarily act as bots, but a human operator periodically takes control of the account to engage with real social media users by responding to comments and posting original content. Influence operations may use cyborg accounts to reduce the amount of direct human input required to maintain a regular account but increase the apparent legitimacy of the cyborg account by occasionally breaking its bot-like behavior with human interaction. ",ST0045,,,T0029 -Create Bot Accounts,Create Inauthentic Accounts,"Bots refer to autonomous internet users that interact with systems or other users while imitating traditional human behavior. Bots use a variety of tools to stay active without direct human operation, including artificial intelligence and big data analytics. For example, an individual may program a Twitter bot to retweet a tweet every time it contains a certain keyword or hashtag. An influence operation may use bots to increase its exposure and artificially promote its content across the internet without dedicating additional time or human resources. -Amplifier bots promote operation content through reposts, shares, and likes to increase the content’s online popularity. Hacker bots are traditionally covert bots running on computer scripts that rarely engage with users and work primarily as agents of larger cyberattacks, such as a Distributed Denial of Service attacks. Spammer bots are programmed to post content on social media or in comment sections, usually as a supplementary tool. Impersonator bots102 pose as real people by mimicking human behavior, complicating their detection. ",ST0046,,,T0029 -Create Sockpuppet Accounts,Create Inauthentic Accounts,Sockpuppet accounts refer to falsified accounts that either promote the influence operation’s own material or attack critics of the material online. Individuals who control sockpuppet accounts also man at least one other user account.67 Sockpuppet accounts help legitimize operation narratives by providing an appearance of external support for the material and discrediting opponents of the operation. ,ST0047,,,T0029 -Recruit Contractors,Recruit bad actors,,ST0048,,,T0030 -Recruit Partisans,Recruit bad actors,,ST0049,,,T0030 -Enlist Troll Accounts,Recruit bad actors,"An influence operation may hire trolls, or human operators of fake accounts that aim to provoke others by posting and amplifying content about controversial issues. Trolls can serve to discredit an influence operation’s opposition or bring attention to the operation’s cause through debate. -Classic trolls refer to regular people who troll for personal reasons, such as attention-seeking or boredom. Classic trolls may advance operation narratives by coincidence but are not directly affiliated with any larger operation. Conversely, hybrid trolls act on behalf of another institution, such as a state or financial organization, and post content with a specific ideological goal. Hybrid trolls may be highly advanced and institutionalized or less organized and work for a single individual. ",ST0050,,,T0030 -Create Organizations,Build Network,"Influence operations may establish organizations with legitimate or falsified hierarchies, staff, and content to structure operation assets, provide a sense of legitimacy to the operation, or provide institutional backing to operation activities.",ST0051,,,T0032 -Follow Trains,Build Network,,ST0052,,,T0032 -Create Community or Sub-group,Build Network,,ST0053,,,T0032 -Fund Proxies,Acquire/ recruit Network,"An influence operation may fund proxies, or external entities that work for the operation. An operation may recruit/train users with existing sympathies towards the operation’s narratives and/or goals as proxies. Funding proxies serves various purposes including: -- Diversifying operation locations to complicate attribution -- Reducing the workload for direct operation assets ",ST0054,,,T0033 -Botnets,Acquire/ recruit Network,,ST0055,,,T0033 -Identify susceptible targets in networks,Infiltrate Existing Networks,,ST0056,,,T0034 -Utilize Butterfly Attack,Infiltrate Existing Networks,"Butterfly attacks occur when operators pretend to be members of a certain social group, usually a group that struggles for representation. An influence operation may mimic a group to insert controversial statements into the discourse, encourage the spread of operation content, or promote harassment among group members. Unlike astroturfing, butterfly attacks aim to infiltrate and discredit existing grassroots movements, organizations, and media campaigns. ",ST0057,,,T0034 -From bad actors,Prepare fundraising campaigns,,ST0058,,"Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. ",T0039 -From ignorant agents,Prepare fundraising campaigns,,ST0059,,"Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. ",T0039 -Create a Content Farm,Leverage Content Farm,,ST0060,,,T0040 -Outsource Content Creation to External Organizations,Leverage Content Farm,"An influence operation may outsource content creation to external companies to avoid attribution, increase the rate of content creation, or improve content quality, i.e., by employing an organization that can create content in the target audience’s native language. Employed organizations may include marketing companies for tailored advertisements or external content farms for high volumes of targeted media. ",ST0061,,,T0040 -Utilize Academic/Pseudoscientific Justifications,Create fake experts,,ST0062,,"Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. ",T0042 -Backstop personas ,Create personas,"Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believability",ST0063,,,T0043 -Create Inauthentic News Sites,Establish Inauthentic News Sites,,ST0064,,"Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.",T0044 -Leverage Existing Inauthentic News Sites,Establish Inauthentic News Sites,"An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. -An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. ",ST0065,,"Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.",T0044 -Astroturfing,Prepare Assets Impersonating Legitimate Entities,"Astroturfing occurs when an influence operation disguises itself as grassroots movement or organization that supports operation narratives. Unlike butterfly attacks, astroturfing aims to increase the appearance of popular support for the operation cause and does not infiltrate existing groups to discredit their objectives. ",ST0066,,"An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. -An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. ",T0045 -Spoof/parody account/site,Prepare Assets Impersonating Legitimate Entities,,ST0067,,"An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. -An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. ",T0045 -Co-Opt Trusted Individuals,Co-opt Trusted Sources,,ST0068,,"An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: -- National or local new outlets -- Research or academic publications -- Online blogs or websites ",T0046 -Co-Opt Grassroots Groups,Co-opt Trusted Sources,,ST0069,,"An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: -- National or local new outlets -- Research or academic publications -- Online blogs or websites ",T0046 -Co-opt Influencers,Co-opt Trusted Sources,,ST0070,,"An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: -- National or local new outlets -- Research or academic publications -- Online blogs or websites ",T0046 -Use existing Echo Chambers/Filter Bubbles,Leverage Echo Chambers/Filter Bubbles,,ST0071,,"An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. ",T0050 -Create Echo Chambers/Filter Bubbles,Leverage Echo Chambers/Filter Bubbles,,ST0072,,"An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. ",T0050 -Exploit Data Voids,Leverage Echo Chambers/Filter Bubbles,"A data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. -A 2019 report by Michael Golebiewski identifies five types of data voids. (1) “Breaking news” data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a “strategic new terms” data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on “outdated terms” that have decreased in popularity, capitalizing on most search engines’ preferences for recency. (4) “Fragmented concepts” data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use “problematic queries” that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term. ",ST0073,,"An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. ",T0050 -Use Encrypted Chat Apps,Chat apps,,ST0074,,"Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.",T0051 -Use Unencrypted Chats Apps,Chat apps,,ST0075,,"Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.",T0051 -Video Livestream,Livestream,,ST0076,,,T0052 -Audio Livestream,Livestream,,ST0077,,,T0052 -Mainstream Social Networks, Social Networks,"Examples include Facebook, Twitter, LinkedIn, VK, ",ST0078,,,T0053 -Dating Apps, Social Networks,,ST0079,,,T0053 -Private/Closed Social Networks, Social Networks,,ST0080,,,T0053 -Interest-Based Networks, Social Networks,"Examples include smaller and niche networks including Gettr, Truth Social, Parler, etc.",ST0081,,,T0053 -Use hashtags, Social Networks,"Use a dedicated, existing hashtag for the campaign/incident.",ST0082,,,T0053 -Create dedicated hashtag, Social Networks,Create a campaign/incident specific hashtag.,ST0083,,,T0053 -Photo Sharing,Media Sharing Networks,"Examples include Instagram, Snapchat, Flickr, etc",ST0084,,"Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.",T0054 -Video Sharing,Media Sharing Networks,"Examples include Youtube, TikTok, ShareChat, Rumble, etc",ST0085,,"Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.",T0054 -Audio sharing,Media Sharing Networks,"Examples include podcasting apps, Soundcloud, etc.",ST0086,,"Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.",T0054 -Anonymous Message Boards,Discussion Forums,Examples include the Chans,ST0087,,"Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc.",T0055 -TV,Traditional Media,,ST0088,,"Examples include TV, Newspaper, Radio, etc.",T0061 -Newspaper,Traditional Media,,ST0089,,"Examples include TV, Newspaper, Radio, etc.",T0061 -Radio,Traditional Media,,ST0090,,"Examples include TV, Newspaper, Radio, etc.",T0061 -Social media,Deliver Ads,,ST0091,,Delivering content via any form of paid media or advertising.,T0070 -Traditional Media,Deliver Ads,"Examples include TV, Radio, Newspaper, billboards",ST0092,,Delivering content via any form of paid media or advertising.,T0070 -Share Memes,Post Content,"Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.",ST0093,,Delivering content by posting via owned media (assets that the operator controls). ,T0071 -Post Violative Content to Provoke Takedown and Backlash,Post Content,,ST0094,,Delivering content by posting via owned media (assets that the operator controls). ,T0071 -One-Way Direct Posting,Post Content,"Direct posting refers to a method of posting content via a one-way messaging service, where the recipient cannot directly respond to the poster’s messaging. An influence operation may post directly to promote operation narratives to the target audience without allowing opportunities for fact-checking or disagreement, creating a false sense of support for the narrative. ",ST0095,,Delivering content by posting via owned media (assets that the operator controls). ,T0071 -Post inauthentic social media comment,Comment or Reply on Content,"Use government-paid social media commenters, astroturfers, chat bots (programmed to reply to specific key words/hashtags) influence online conversations, product reviews, web-site comment forums.",ST0096,,Delivering content by replying or commenting via owned media (assets that the operator controls). ,T0072 -Trolls amplify and manipulate,Flooding the Information Space,"Use trolls to amplify narratives and/or manipulate narratives. Fake profiles/sockpuppets operating to support individuals/narratives from the entire political spectrum (left/right binary). Operating with increased emphasis on promoting local content and promoting real Twitter users generating their own, often divisive political content, as it's easier to amplify existing content than create new/original content. Trolls operate where ever there's a socially divisive issue (issues that can/are be politicized).",ST0097,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0074 -Hijack existing hashtag,Flooding the Information Space,Take over an existing hashtag to drive exposure.,ST0098,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0074 -Bots Amplify via Automated Forwarding and Reposting,Flooding the Information Space,"Automated forwarding and reposting refer to the proliferation of operation content using automated means, such as artificial intelligence or social media bots. An influence operation may use automated activity to increase content exposure without dedicating the resources, including personnel and time, traditionally required to forward and repost content. -Use bots to amplify narratives above algorithm thresholds. Bots are automated/programmed profiles designed to amplify content (ie: automatically retweet or like) and give appearance it's more ""popular"" than it is. They can operate as a network, to function in a coordinated/orchestrated manner. In some cases (more so now) they are an inexpensive/disposable assets used for minimal deployment as bot detection tools improve and platforms are more responsive.",ST0099,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0074 -Utilize Spamoflauge,Flooding the Information Space,"Spamoflauge refers to the practice of disguising spam messages as legitimate. Spam refers to the use of electronic messaging systems to send out unrequested or unwanted messages in bulk. Simple methods of spamoflauge include replacing letters with numbers to fool keyword-based email spam filters, for example, ""you've w0n our jackp0t!"". Spamoflauge may extend to more complex techniques such as modifying the grammar or word choice of the language, casting messages as images which spam detectors cannot automatically read, or encapsulating messages in password protected attachments, such as .pdf or .zip files. Influence operations may use spamoflauge to avoid spam filtering systems and increase the likelihood of the target audience receiving operation messaging. ",ST0100,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0074 -Conduct Swarming,Flooding the Information Space,"Swarming refers to the coordinated use of accounts to overwhelm the information space with operation content. Unlike information flooding, swarming centers exclusively around a specific event or actor rather than a general narrative. Swarming relies on “horizontal communication” between information assets rather than a top-down, vertical command-and-control approach. ",ST0101,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0074 -Conduct Keyword Squatting,Flooding the Information Space,"Keyword squatting refers to the creation of online content, such as websites, articles, or social media accounts, around a specific search engine-optimized term to overwhelm the search results of that term. An influence may keyword squat to increase content exposure to target audience members who query the exploited term in a search engine and manipulate the narrative around the term. ",ST0102,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0074 -Inauthentic Sites Amplify News and Narratives,Flooding the Information Space,"Inauthentic sites circulate cross-post stories and amplify narratives. Often these sites have no masthead, bylines or attribution.",ST0103,,Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.,T0074 -Post Across Groups,Cross-Posting,,ST0104,,"Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. ",T0076 -Post Across Platform,Cross-Posting,,ST0105,,"Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. ",T0076 -Post Across Disciplines,Cross-Posting,,ST0106,,"Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. ",T0076 -Use Affiliate Marketing Programs,Incentivize Sharing,,ST0107,,"Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.",T0077 -Use Contests and Prizes,Incentivize Sharing,,ST0108,,"Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.",T0077 -Bypass Content Blocking,Manipulate Platform Algorithm,"Bypassing content blocking refers to actions taken to circumvent network security measures that prevent users from accessing certain servers, resources, or other online spheres. An influence operation may bypass content blocking to proliferate its content on restricted areas of the internet. Common strategies for bypassing content blocking include: -- Altering IP addresses to avoid IP filtering -- Using a Virtual Private Network (VPN) to avoid IP filtering -- Using a Content Delivery Network (CDN) to avoid IP filtering -- Enabling encryption to bypass packet inspection blocking -- Manipulating text to avoid filtering by keywords -- Posting content on multiple platforms to avoid platform-specific removals - Using local facilities or modified DNS servers to avoid DNS filtering ",ST0109,,"Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. ",T0078 -"Boycott/""Cancel"" Opponents",Harass,"Cancel culture refers to the phenomenon in which individuals collectively refrain from supporting an individual, organization, business, or other entity, usually following a real or falsified controversy. An influence operation may exploit cancel culture by emphasizing an adversary’s problematic or disputed behavior and presenting its own content as an alternative. ",ST0110,,"Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. ",T0080 -Harass People Based on Identities,Harass,"Examples include social identities like gender, sexuality, race, ethnicity, religion, ability, nationality, etc. as well as roles and occupations like journalist or activist.",ST0111,,"Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. ",T0080 -Threaten to Dox,Harass,"Doxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content. ",ST0112,,"Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. ",T0080 -Dox,Harass,"Doxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content. ",ST0113,,"Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. ",T0080 -Delete Opposing Content,Control Information Environment through Offensive Cyberspace Operations,"Deleting opposing content refers to the removal of content that conflicts with operational narratives from selected platforms. An influence operation may delete opposing content to censor contradictory information from the target audience, allowing operation narratives to take priority in the information space.",ST0114,,Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.,T0082 -Block Content,Control Information Environment through Offensive Cyberspace Operations,Content blocking refers to actions taken to restrict internet access or render certain areas of the internet inaccessible. An influence operation may restrict content based on both network and content attributes. ,ST0115,,Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.,T0082 -Destroy Information Generation Capabilities,Control Information Environment through Offensive Cyberspace Operations,"Destroying information generation capabilities refers to actions taken to limit, degrade, or otherwise incapacitate an actor’s ability to generate conflicting information. An influence operation may destroy an actor’s information generation capabilities by physically dismantling the information infrastructure, disconnecting resources needed for information generation, or redirecting information generation personnel. An operation may destroy an adversary’s information generation capabilities to limit conflicting content exposure to the target audience and crowd the information space with its own narratives. ",ST0116,,Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.,T0082 -Conduct Server Redirect,Control Information Environment through Offensive Cyberspace Operations,"A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.",ST0117,,Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.,T0082 -Report Non-Violative Opposing Content,Suppress Opposition,"Reporting opposing content refers to notifying and providing an instance of a violation of a platform’s guidelines and policies for conduct on the platform. In addition to simply reporting the content, an operation may leverage copyright regulations to trick social media and web platforms into removing opposing content by manipulating the content to appear in violation of copyright laws. Reporting opposing content facilitates the suppression of contradictory information and allows operation narratives to take priority in the information space. ",ST0118,,,T0083 -Goad People into Harmful Action (Stop Hitting Yourself),Suppress Opposition,Goad people into actions that violate terms of service or will lead to having their content or accounts taken down. ,ST0119,,,T0083 -Exploit Platform TOS/Content Moderation,Suppress Opposition,,ST0120,,,T0083 -Call to action to attend ,Encourage Attendance at Events,,ST0121,,Operation encourages attendance at existing real world event.,T0085 -Facilitate logistics or support for attendance,Encourage Attendance at Events,"Facilitate logistics or support for travel, food, housing, etc.",ST0122,,Operation encourages attendance at existing real world event.,T0085 -Pay for Physical Action,Organize Events,"Paying for physical action occurs when an influence operation pays individuals to act in the physical realm. An influence operation may pay for physical action to create specific situations and frame them in a way that supports operation narratives, for example, paying a group of people to burn a car to later post an image of the burning car and frame it as an act of protest. ",ST0123,,"Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.",T0086 -Conduct Symbolic Action,Organize Events,"Symbolic action refers to activities specifically intended to advance an operation’s narrative by signaling something to the audience, for example, a military parade supporting a state’s narrative of military superiority. An influence operation may use symbolic action to create falsified evidence supporting operation narratives in the physical information space. ",ST0124,,"Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.",T0086 -Conduct Crowdfunding Campaigns,Conduct fundraising,,ST0125,,"Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. ",T0087 -Conduct Physical Violence,Physical Violence,,ST0126,,"Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. ",T0088 -Encourage Physical Violence,Physical Violence,,ST0127,,"Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. ",T0088 -Sell Merchandise,Merchandising/ Advertising,"Selling merchandise refers to the sale of often branded items to the target audience. An influence operation may sell merchandise to raise funds and promote its messaging in the physical information space, for example, by selling t-shirts with operational messaging displayed on the clothing. ",ST0128,,Merchandising/Advertising refers to getting the message or narrative into physical space in the offline world,T0089 -Use Pseudonyms,Conceal People,"An operation may use pseudonyms, or fake names, to mask the identity of operation accounts, publish anonymous content, or otherwise use falsified personas to conceal identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account with the same falsified name. ",ST0129,,Conceal the identity or provenance of the account and people assets.,T0090 -Conceal Network Identity,Conceal People,"Concealing network identity aims to hide the existence an influence operation’s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organization. ",ST0130,,Conceal the identity or provenance of the account and people assets.,T0090 -Distance Reputable Individuals from Operation,Conceal People,"Distancing reputable individuals from the operation occurs when enlisted individuals, such as celebrities or subject matter experts, actively disengage themselves from operation activities and messaging. Individuals may distance themselves from the operation by deleting old posts or statements, unfollowing operation information assets, or otherwise detaching themselves from the operation’s timeline. An influence operation may want reputable individuals to distance themselves from the operation to reduce operation exposure, particularly if the operation aims to remove all evidence.",ST0131,,Conceal the identity or provenance of the account and people assets.,T0090 -Launder Accounts,Conceal People,Account laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution. ,ST0132,,Conceal the identity or provenance of the account and people assets.,T0090 -Change Names of Accounts,Conceal People,Changing names of accounts occurs when an operation changes the name of an existing social media account. An operation may change the names of its accounts throughout an operation to avoid detection or alter the names of newly acquired or repurposed accounts to fit operational narratives. ,ST0133,,Conceal the identity or provenance of the account and people assets.,T0090 -Conceal Network Identity,Conceal Operational Activity,"Concealing network identity aims to hide the existence an influence operation’s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organization. ",ST0134,,,T0091 -Generate Content Unrelated to Narrative,Conceal Operational Activity,"An influence operation may mix its own operation content with legitimate news or external unrelated content to disguise operational objectives, narratives, or existence. For example, an operation may generate ""lifestyle"" or ""cuisine"" content alongside regular operation content. ",ST0135,,,T0091 -Break Association with Content,Conceal Operational Activity,"Breaking association with content occurs when an influence operation actively separates itself from its own content. An influence operation may break association with content by unfollowing, unliking, or unsharing its content, removing attribution from its content, or otherwise taking actions that distance the operation from its messaging. An influence operation may break association with its content to complicate attribution or regain credibility for a new operation. ",ST0136,,,T0091 -Delete URLs,Conceal Operational Activity,"URL deletion occurs when an influence operation completely removes its website registration, rendering the URL inaccessible. An influence operation may delete its URLs to complicate attribution or remove online documentation that the operation ever occurred.",ST0137,,,T0091 -Coordinate on encrypted/ closed networks,Conceal Operational Activity,,ST0138,,,T0091 -Deny involvement,Conceal Operational Activity,"Without ""smoking gun"" proof (and even with proof), incident creator can or will deny involvement. This technique also leverages the attacker advantages outlined in ""Demand insurmountable proof"", specifically the asymmetric disadvantage for truth-tellers in a ""firehose of misinformation"" environment.",ST0139,,,T0091 -Delete Accounts/Account Activity,Conceal Operational Activity,"Deleting accounts and account activity occurs when an influence operation removes its online social media assets, including social media accounts, posts, likes, comments, and other online artifacts. An influence operation may delete its accounts and account activity to complicate attribution or remove online documentation that the operation ever occurred. ",ST0140,,,T0091 -Redirect URLs,Conceal Operational Activity,"An influence operation may redirect its falsified or typosquatted URLs to legitimate websites to increase the operation's appearance of legitimacy, complicate attribution, and avoid detection. ",ST0141,,,T0091 -Remove Post Origins,Conceal Operational Activity,"Removing post origins refers to the elimination of evidence that indicates the initial source of operation content, often to complicate attribution. An influence operation may remove post origins by deleting watermarks, renaming files, or removing embedded links in its content. ",ST0142,,,T0091 -Misattribute Activity,Conceal Operational Activity,"Misattributed activity refers to incorrectly attributed operation activity. For example, a state sponsored influence operation may conduct operation activity in a way that mimics another state so that external entities misattribute activity to the incorrect state. An operation may misattribute their activities to complicate attribution, avoid detection, or frame an adversary for negative behavior. ",ST0143,,,T0091 -Conceal Sponsorship,Conceal Infrastructure,"Concealing sponsorship aims to mislead or obscure the identity of the hidden sponsor behind an operation rather than entity publicly running the operation. Operations that conceal sponsorship may maintain visible falsified groups, news outlets, non-profits, or other organizations, but seek to mislead or obscure the identity sponsoring, funding, or otherwise supporting these entities. -Influence operations may use a variety of techniques to mask the location of their social media accounts to complicate attribution and conceal evidence of foreign interference. Operation accounts may set their location to a false place, often the location of the operation’s target audience, and post in the region’s language",ST0144,,,T0092 -Utilize Bulletproof Hosting,Conceal Infrastructure,"Hosting refers to services through which storage and computing resources are provided to an individual or organization for the accommodation and maintenance of one or more websites and related services. Services may include web hosting, file sharing, and email distribution. Bulletproof hosting refers to services provided by an entity, such as a domain hosting or web hosting firm, that allows its customer considerable leniency in use of the service. An influence operation may utilize bulletproof hosting to maintain continuity of service for suspicious, illegal, or disruptive operation activities that stricter hosting services would limit, report, or suspend. ",ST0145,,,T0092 -Use Shell Organizations,Conceal Infrastructure,,ST0146,,,T0092 -Use Cryptocurrency,Conceal Infrastructure,,ST0147,,,T0092 -Obfuscate Payment,Conceal Infrastructure,,ST0148,,,T0092 -Legacy web content,Exploit TOS/Content Moderation,"Make incident content visible for a long time, e.g. by exploiting platform terms of service, or placing it where it's hard to remove or unlikely to be removed.",ST0149,,,T0093 -Post Borderline Content,Exploit TOS/Content Moderation,,ST0150,,,T0093 -People Focused,Measure Performance,,ST0151,,,T0095 -Content Focused,Measure Performance,,ST0152,,,T0095 -View Focused,Measure Performance,,ST0153,,,T0095 -Behavior changes,Measure Effectiveness,Monitor and evaluate behaviour changes from misinformation incidents. ,ST0154,,,T0096 -Content,Measure Effectiveness,,ST0155,,,T0096 -Awareness,Measure Effectiveness,,ST0156,,,T0096 -Knowledge,Measure Effectiveness,,ST0157,,,T0096 -Action/attitude,Measure Effectiveness,,ST0158,,,T0096 -Message reach,Measure Effectiveness Indicators (or KPIs),Monitor and evaluate message reach in misinformation incidents. ,ST0159,,,T0097 -Social media engagement,Measure Effectiveness Indicators (or KPIs),Monitor and evaluate social media engagement in misinformation incidents.,ST0160,,,T0097 diff --git a/DISARM_MASTER_DATA/.DS_Store b/DISARM_MASTER_DATA/.DS_Store index 1b7106a..755bc8b 100644 Binary files a/DISARM_MASTER_DATA/.DS_Store and b/DISARM_MASTER_DATA/.DS_Store differ diff --git a/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_COMMENTS_MASTER.csv b/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_COMMENTS_MASTER_0_1.csv similarity index 100% rename from DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_COMMENTS_MASTER.csv rename to DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_COMMENTS_MASTER_0_1.csv diff --git a/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_DATA_MASTER.xlsx b/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_DATA_MASTER_0_1.xlsx similarity index 100% rename from DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_DATA_MASTER.xlsx rename to DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_DATA_MASTER_0_1.xlsx diff --git a/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_FRAMEWORKS_MASTER.xlsx b/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_FRAMEWORKS_MASTER_0_1.xlsx similarity index 72% rename from DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_FRAMEWORKS_MASTER.xlsx rename to DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_FRAMEWORKS_MASTER_0_1.xlsx index 9b7e41d..7795b32 100644 Binary files a/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_FRAMEWORKS_MASTER.xlsx and b/DISARM_MASTER_DATA/2022-06-30_DISARM_0_1/DISARM_FRAMEWORKS_MASTER_0_1.xlsx differ diff --git a/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx b/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx index 9b7e41d..cca72d3 100644 Binary files a/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx and b/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx differ diff --git a/DISARM_MASTER_DATA/~$DISARM_FRAMEWORKS_MASTER.xlsx b/DISARM_MASTER_DATA/~$DISARM_FRAMEWORKS_MASTER.xlsx deleted file mode 100644 index 5a93205..0000000 Binary files a/DISARM_MASTER_DATA/~$DISARM_FRAMEWORKS_MASTER.xlsx and /dev/null differ diff --git a/generated_files/blue_framework_ids.csv b/generated_files/blue_framework_ids.csv index c0c6d1c..d926ce5 100644 --- a/generated_files/blue_framework_ids.csv +++ b/generated_files/blue_framework_ids.csv @@ -1,30 +1,30 @@ -P01,P01,P01,P02,P02,P02,P02,P02,P03,P03,P03,P03,P04 -TA01,TA02,TA13,TA03,TA04,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12 -C00006,C00009,,C00034,C00047,C00065,C00014,C00090,C00100,C00109,,C00131,C00140 -C00008,C00011,,C00036,C00052,C00066,C00032,C00097,C00112,C00122,,C00138,C00148 -C00010,C00028,,C00040,C00053,C00130,C00071,C00098,C00113,C00123,,C00139,C00149 -C00012,C00029,,C00042,C00056,C00178,C00072,C00099,C00114,C00124,,C00143, -C00013,C00030,,C00044,C00059,C00216,C00074,C00101,C00115,C00125,,, -C00016,C00031,,C00046,C00062,,C00075,C00103,C00116,C00126,,, -C00017,C00060,,C00048,C00135,,C00076,C00105,C00117,C00128,,, -C00019,C00070,,C00051,C00162,,C00078,C00195,C00118,C00129,,, -C00021,C00092,,C00058,C00172,,C00080,,C00119,C00147,,, -C00022,C00144,,C00067,C00203,,C00081,,C00120,C00182,,, -C00024,C00156,,C00077,,,C00082,,C00121,C00200,,, -C00026,C00164,,C00093,,,C00084,,C00136,C00211,,, -C00027,C00169,,C00133,,,C00085,,C00154,,,, -C00073,C00207,,C00155,,,C00086,,C00184,,,, -C00096,C00222,,C00160,,,C00087,,C00188,,,, -C00111,,,C00189,,,C00091,,,,,, -C00153,,,C00197,,,C00094,,,,,, -C00159,,,,,,C00106,,,,,, -C00161,,,,,,C00107,,,,,, -C00170,,,,,,C00142,,,,,, -C00174,,,,,,C00165,,,,,, -C00176,,,,,,C00202,,,,,, -C00190,,,,,,C00219,,,,,, -C00205,,,,,,,,,,,, -C00212,,,,,,,,,,,, -C00220,,,,,,,,,,,, -C00221,,,,,,,,,,,, -C00223,,,,,,,,,,,, +P01,P01,P01,P02,P02,P02,P02,P02,P02,P03,P03,P03,P03,P03,P03,P04 +TA01,TA02,TA03,TA04,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16 +C00006,C00009,C00034,C00047,C00065,C00014,C00090,C00100,C00109,,C00131,C00140,,,, +C00008,C00011,C00036,C00052,C00066,C00032,C00097,C00112,C00122,,C00138,C00148,,,, +C00010,C00028,C00040,C00053,C00130,C00071,C00098,C00113,C00123,,C00139,C00149,,,, +C00012,C00029,C00042,C00056,C00178,C00072,C00099,C00114,C00124,,C00143,,,,, +C00013,C00030,C00044,C00059,C00216,C00074,C00101,C00115,C00125,,,,,,, +C00016,C00031,C00046,C00062,,C00075,C00103,C00116,C00126,,,,,,, +C00017,C00060,C00048,C00135,,C00076,C00105,C00117,C00128,,,,,,, +C00019,C00070,C00051,C00162,,C00078,C00195,C00118,C00129,,,,,,, +C00021,C00092,C00058,C00172,,C00080,,C00119,C00147,,,,,,, +C00022,C00144,C00067,C00203,,C00081,,C00120,C00182,,,,,,, +C00024,C00156,C00077,,,C00082,,C00121,C00200,,,,,,, +C00026,C00164,C00093,,,C00084,,C00136,C00211,,,,,,, +C00027,C00169,C00133,,,C00085,,C00154,,,,,,,, +C00073,C00207,C00155,,,C00086,,C00184,,,,,,,, +C00096,C00222,C00160,,,C00087,,C00188,,,,,,,, +C00111,,C00189,,,C00091,,,,,,,,,, +C00153,,C00197,,,C00094,,,,,,,,,, +C00159,,,,,C00106,,,,,,,,,, +C00161,,,,,C00107,,,,,,,,,, +C00170,,,,,C00142,,,,,,,,,, +C00174,,,,,C00165,,,,,,,,,, +C00176,,,,,C00202,,,,,,,,,, +C00190,,,,,C00219,,,,,,,,,, +C00205,,,,,,,,,,,,,,, +C00212,,,,,,,,,,,,,,, +C00220,,,,,,,,,,,,,,, +C00221,,,,,,,,,,,,,,, +C00223,,,,,,,,,,,,,,, diff --git a/generated_files/disarm_blue_framework_clickable.html b/generated_files/disarm_blue_framework_clickable.html index 8102c8d..72e7176 100644 --- a/generated_files/disarm_blue_framework_clickable.html +++ b/generated_files/disarm_blue_framework_clickable.html @@ -32,6 +32,9 @@ function handleTechniqueClick(box) { P02 Prepare P02 Prepare P02 Prepare +P02 Prepare +P03 Execute +P03 Execute P03 Execute P03 Execute P03 Execute @@ -39,24 +42,26 @@ function handleTechniqueClick(box) { P04 Assess -TA01 Strategic Planning -TA02 Objective Planning -TA13 Conduct Center of Gravity Analysis -TA03 Develop People -TA04 Develop Networks -TA05 Microtargeting -TA06 Develop Content -TA07 Channel Selection -TA08 Pump Priming -TA09 Exposure -TA10 Drive Offline Activity -TA11 Persistence -TA12 Measure Effectiveness +TA01 Plan Strategy +TA02 Plan Objectives +TA03 Target Audience Analysis +TA04 Develop Narratives +TA05 Develop Content +TA06 Establish Social Assets +TA07 Establish Legitimacy +TA08 Microtarget +TA09 Select Channels and Affordances +TA10 Conduct Pump Priming +TA11 Deliver Content +TA12 Maximize Exposure +TA13 Drive Online Harms +TA14 Drive Offline Activity +TA15 Persist in the Information Environment +TA16 Assess Effectiveness C00006 Charge for social media C00009 Educate high profile influencers on best practices - C00034 Create more friction at account creation C00047 Honeypot with coordinated inauthentics C00065 Reduce political targeting @@ -67,11 +72,14 @@ function handleTechniqueClick(box) { C00131 Seize and analyse botnet servers C00140 "Bomb" link shorteners with lots of calls + + + + C00008 Create shared fact-checking database C00011 Media literacy. Games to identify fake news - C00036 Infiltrate the in-group to discredit leaders (divide) C00052 Infiltrate platforms C00066 Co-opt a hashtag and drown it out (hijack it back) @@ -82,11 +90,14 @@ function handleTechniqueClick(box) { C00138 Spam domestic actors with lawsuits C00148 Add random links to network graphs + + + + C00010 Enhanced privacy regulation for social media C00028 Make information provenance available - C00040 third party verification for people C00053 Delete old accounts / Remove unused social media accounts C00130 Mentorship: elders, youth, credit. Learn vicariously. @@ -97,11 +108,14 @@ function handleTechniqueClick(box) { C00139 Weaponise youtube content matrices C00149 Poison the monitoring & evaluation data + + + + C00012 Platform regulation C00029 Create fake website to issue counter narrative and counter narrative through physical merchandise - C00042 Address truth contained in narratives C00056 Encourage people to leave social media C00178 Fill information voids with non-disinformation content @@ -112,11 +126,14 @@ function handleTechniqueClick(box) { C00143 (botnet) DMCA takedown requests to waste group time + + + + C00013 Rating framework for news C00030 Develop a compelling counter narrative (truth based) - C00044 Keep people from posting to social media immediately C00059 Verification of project before posting fund requests C00216 Use advertiser controls to stem flow of funds to bad actors @@ -127,11 +144,14 @@ function handleTechniqueClick(box) { + + + + C00016 Censorship C00031 Dilute the core narrative - create multiple permutations, target / amplify - C00046 Marginalise and discredit extremist groups C00062 Free open library sources worldwide @@ -142,11 +162,14 @@ function handleTechniqueClick(box) { + + + + C00017 Repair broken social connections C00060 Legal action against for-profit engagement factories - C00048 Name and Shame Influencers C00135 Deplatform message groups and/or message boards @@ -157,11 +180,14 @@ function handleTechniqueClick(box) { + + + + C00019 Reduce effect of division-enablers C00070 Block access to disinformation resources - C00051 Counter social engineering training C00162 Unravel/target the Potemkin villages @@ -172,11 +198,14 @@ function handleTechniqueClick(box) { + + + + C00021 Encourage in-person communication C00092 Establish a truth teller reputation score for influencers - C00058 Report crowdfunder as violator C00172 social media source removal @@ -187,11 +216,14 @@ function handleTechniqueClick(box) { + + + + C00022 Innoculate. Positive campaign to promote feeling of safety C00144 Buy out troll farm employees / offer them jobs - C00067 Denigrate the recipient/ project (of online funding) C00203 Stop offering press credentials to propaganda outlets @@ -202,18 +234,25 @@ function handleTechniqueClick(box) { + + + + C00024 Promote healthy narratives C00156 Better tell your country or organization story - C00077 Active defence: run TA03 "develop people” - not recommended C00082 Ground truthing as automated response to pollution C00121 Tool transparency and literacy for channels people follow. -C00200 Influencer disavows misinfo +C00200 Respected figure (influencer) disavows misinfo + + + + @@ -221,7 +260,6 @@ function handleTechniqueClick(box) { C00026 Shore up democracy based messages C00164 compatriot policy - C00093 Influencer code of conduct @@ -232,11 +270,14 @@ function handleTechniqueClick(box) { + + + + C00027 Create culture of civility C00169 develop a creative content hub - C00133 Deplatform Account* @@ -247,11 +288,14 @@ function handleTechniqueClick(box) { + + + + C00073 Inoculate populations through media literacy training C00207 Run a competing disinformation campaign - not recommended - C00155 Ban incident actors from funding sites @@ -262,11 +306,14 @@ function handleTechniqueClick(box) { + + + + C00096 Strengthen institutions that are always truth tellers C00222 Tabletop simulations - C00160 find and train influencers @@ -277,11 +324,14 @@ function handleTechniqueClick(box) { + + + + C00111 Reduce polarisation by connecting and presenting sympathetic renditions of opposite views - C00189 Ensure that platforms are taking down flagged accounts @@ -292,11 +342,14 @@ function handleTechniqueClick(box) { + + + + C00153 Take pre-emptive action against actors' infrastructure - C00197 remove suspicious accounts @@ -307,6 +360,10 @@ function handleTechniqueClick(box) { + + + + C00159 Have a disinformation response plan @@ -314,7 +371,6 @@ function handleTechniqueClick(box) { - C00106 Click-bait centrist content @@ -322,6 +378,10 @@ function handleTechniqueClick(box) { + + + + C00161 Coalition Building with stakeholders and Third-Party Inducements @@ -329,7 +389,6 @@ function handleTechniqueClick(box) { - C00107 Content moderation @@ -337,6 +396,10 @@ function handleTechniqueClick(box) { + + + + C00170 elevate information as a critical domain of statecraft @@ -344,7 +407,6 @@ function handleTechniqueClick(box) { - C00142 Platform adds warning label and decision point when sharing content @@ -352,6 +414,10 @@ function handleTechniqueClick(box) { + + + + C00174 Create a healthier news environment @@ -359,7 +425,6 @@ function handleTechniqueClick(box) { - C00165 Ensure integrity of official documents @@ -367,6 +432,10 @@ function handleTechniqueClick(box) { + + + + C00176 Improve Coordination amongst stakeholders: public and private @@ -374,7 +443,6 @@ function handleTechniqueClick(box) { - C00202 Set data 'honeytraps' @@ -382,6 +450,10 @@ function handleTechniqueClick(box) { + + + + C00190 open engagement with civil society @@ -389,7 +461,6 @@ function handleTechniqueClick(box) { - C00219 Add metadata to content that’s out of the control of disinformation creators @@ -397,6 +468,10 @@ function handleTechniqueClick(box) { + + + + C00205 strong dialogue between the federal government and private sector to encourage better reporting @@ -412,6 +487,9 @@ function handleTechniqueClick(box) { + + + C00212 build public resilience by making civil society more vibrant @@ -427,6 +505,9 @@ function handleTechniqueClick(box) { + + + C00220 Develop a monitoring and intelligence plan @@ -442,6 +523,9 @@ function handleTechniqueClick(box) { + + + C00221 Run a disinformation red team, and design mitigation factors @@ -457,6 +541,9 @@ function handleTechniqueClick(box) { + + + C00223 Strengthen Trust in social media platforms @@ -472,6 +559,9 @@ function handleTechniqueClick(box) { + + + @@ -573,7 +663,7 @@ function handleTechniqueClick(box) { - + diff --git a/generated_files/disarm_red_framework_clickable.html b/generated_files/disarm_red_framework_clickable.html index f620ca1..4200b28 100644 --- a/generated_files/disarm_red_framework_clickable.html +++ b/generated_files/disarm_red_framework_clickable.html @@ -32,6 +32,9 @@ function handleTechniqueClick(box) { P02 Prepare P02 Prepare P02 Prepare +P02 Prepare +P03 Execute +P03 Execute P03 Execute P03 Execute P03 Execute @@ -39,106 +42,145 @@ function handleTechniqueClick(box) { P04 Assess -TA01 Strategic Planning -TA02 Objective Planning -TA13 Conduct Center of Gravity Analysis -TA03 Develop People -TA04 Develop Networks -TA05 Microtargeting -TA06 Develop Content -TA07 Channel Selection -TA08 Pump Priming -TA09 Exposure -TA10 Drive Offline Activity -TA11 Persistence -TA12 Measure Effectiveness +TA01 Plan Strategy +TA02 Plan Objectives +TA03 Target Audience Analysis +TA04 Develop Narratives +TA05 Develop Content +TA06 Establish Social Assets +TA07 Establish Legitimacy +TA08 Microtarget +TA09 Select Channels and Affordances +TA10 Conduct Pump Priming +TA11 Deliver Content +TA12 Maximize Exposure +TA13 Drive Online Harms +TA14 Drive Offline Activity +TA15 Persist in the Information Environment +TA16 Assess Effectiveness -T0001 5Ds (dismiss, distort, distract, dismay, divide) -T0006 Develop Narrative Concepts -T0071 Find echo chambers -T0007 Create fake Social Media Profiles / Pages / Groups -T0010 Cultivate ignorant agents -T0016 Clickbait -T0019 Generate information pollution -T0029 Manipulate online polls -T0039 Bait legitimate influencers -T0047 Muzzle social media as a political force -T0057 Organise remote rallies and events -T0058 Legacy web content -T0062 Behaviour changes +T0001 Determine Target Audiences +T0003 Dismiss +T0010 Map Target Audience Information Environment +T0013 Develop New Narratives +T0020 Reuse Existing Content +T0029 Create Inauthentic Accounts +T0041 Compromise legitimate accounts +T0047 Create Clickbait +T0051 Chat apps +T0063 Trial content +T0070 Deliver Ads +T0074 Flooding the Information Space +T0080 Harass +T0085 Encourage Attendance at Events +T0090 Conceal People +T0095 Measure Performance -T0002 Facilitate State Propaganda -T0066 Degrade adversary -T0072 Segment audiences -T0008 Create fake or imposter news sites -T0011 Compromise legitimate account -T0017 Conduct Fundraising Campaigns -T0020 Trial content -T0030 Backstop personas -T0040 Demand unsurmountable proof -T0048 Cow online opinion leaders -T0061 Sell merchandising -T0059 Play the long game -T0063 Message reach +T0002 Determine Strategic Ends +T0004 Distort +T0011 Identify Social and Technical Vulnerabilities +T0014 Leverage Existing Narratives +T0021 Develop Text-based Content +T0030 Recruit bad actors +T0042 Create fake experts +T0048 Purchase Targeted Advertisements +T0052 Livestream +T0064 Bait legitimate influencers +T0071 Post Content +T0075 Amplify Existing Narrative +T0081 Censor social media as a political force +T0086 Organize Events +T0091 Conceal Operational Activity +T0096 Measure Effectiveness -T0003 Leverage Existing Narratives -T0067 Plan to discredit credible sources -T0009 Create fake experts -T0012 Use concealment -T0018 Purchase advertisements -T0021 Memes -T0031 YouTube -T0041 Deny involvement -T0049 Flooding - -T0060 Continue to amplify -T0064 Social media engagement +T0005 Distract +T0012 Segment Audiences +T0015 Develop Competing Narratives +T0022 Develop Image-based Content +T0031 Cultivate ignorant agents +T0043 Create personas +T0049 Create Localized Content +T0053 Social Networks +T0065 Seed Kernel of truth +T0072 Comment or Reply on Content +T0076 Cross-Posting +T0082 Control Information Environment through Offensive Cyberspace Operations +T0087 Conduct fundraising +T0092 Conceal Infrastructure +T0097 Measure Effectiveness Indicators (or KPIs) -T0004 Devise Competing Narratives -T0068 Respond to breaking news event +T0006 Dismay -T0013 Create fake websites +T0016 Leverage Conspiracy Theory Narratives +T0023 Develop Video-based Content +T0032 Build Network +T0044 Establish Inauthentic News Sites +T0050 Leverage Echo Chambers/Filter Bubbles +T0054 Media Sharing Networks +T0066 Seed distortions +T0073 Attract Traditional Media +T0077 Incentivize Sharing +T0083 Suppress Opposition +T0088 Physical Violence +T0093 Exploit TOS/Content Moderation + + + + +T0007 Divide + +T0017 Integrate Target Audience Vulnerabilities into Narrative +T0024 Develop Audio-based Content +T0033 Acquire/ recruit Network +T0045 Prepare Assets Impersonating Legitimate Entities + +T0055 Discussion Forums +T0067 Use fake experts + +T0078 Manipulate Platform Algorithm +T0084 Platform Filtering +T0089 Merchandising/ Advertising +T0094 Play the long game + + + + +T0008 Degrade Adversary + +T0018 Respond to Breaking News Event or Active Crisis +T0025 Generate information pollution +T0034 Infiltrate Existing Networks +T0046 Co-opt Trusted Sources + +T0056 Bookmarking and Content Curation +T0068 Use Search Engine Optimization + +T0079 Direct Users to Alternative Platforms -T0022 Conspiracy narratives -T0032 Reddit -T0042 Kernel of Truth -T0050 Cheerleading domestic social media ops -T0069 Respond to active crisis +T0009 Facilitate State Propaganda + +T0019 Demand insurmountable proof +T0026 Distort facts +T0035 Create Inauthentic Social Media Pages and Groups -T0014 Prepare fundraising campaigns - -T0023 Distort facts -T0033 Instagram -T0043 Use SMS/ WhatsApp/ Chat apps -T0051 Fabricate social media comment +T0057 Blogging and Publishing Networks +T0069 Employ Commercial Analytic Firms - - - -T0070 Analyze existing communities - - -T0015 Create hashtags - -T0024 Create fake videos and images -T0034 LinkedIn -T0044 Seed distortions -T0052 Tertiary sites amplify news @@ -148,12 +190,33 @@ function handleTechniqueClick(box) { -T0065 Use physical broadcast capabilities +T0027 Create hashtags and search artifacts +T0036 Create inauthentic websites + + +T0058 Consumer Review Networks + + + + + + + + + + + + + +T0028 Obtain Private Documents +T0037 Prepare Physical Broadcast Capabilities + + +T0059 Online polls + + + -T0025 Leak altered documents -T0035 Pinterest -T0045 Use fake experts -T0053 Twitter trolls amplify and manipulate @@ -164,11 +227,14 @@ function handleTechniqueClick(box) { +T0038 Develop Owned Media Assets + + +T0060 Formal Diplomatic Channels + + + -T0026 Create pseudoscientific or disingenuous research -T0036 WhatsApp -T0046 Search Engine Optimization -T0054 Twitter bots amplify @@ -179,11 +245,14 @@ function handleTechniqueClick(box) { +T0039 Prepare fundraising campaigns + + +T0061 Traditional Media + + -T0027 Adapt existing narratives -T0037 Facebook -T0055 Use hashtag @@ -194,11 +263,14 @@ function handleTechniqueClick(box) { +T0040 Leverage Content Farm + + +T0062 Email + + -T0028 Create competing narratives -T0038 Twitter -T0056 Dedicated channels disseminate information pollution @@ -208,77 +280,103 @@ function handleTechniqueClick(box) {
diff --git a/generated_files/red_framework_ids.csv b/generated_files/red_framework_ids.csv index fcc75ff..20c8965 100644 --- a/generated_files/red_framework_ids.csv +++ b/generated_files/red_framework_ids.csv @@ -1,12 +1,14 @@ -P01,P01,P01,P02,P02,P02,P02,P02,P03,P03,P03,P03,P04 -TA01,TA02,TA13,TA03,TA04,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12 -T0001,T0006,T0071,T0007,T0010,T0016,T0019,T0029,T0039,T0047,T0057,T0058,T0062 -T0002,T0066,T0072,T0008,T0011,T0017,T0020,T0030,T0040,T0048,T0061,T0059,T0063 -T0003,T0067,,T0009,T0012,T0018,T0021,T0031,T0041,T0049,,T0060,T0064 -T0004,T0068,,,T0013,,T0022,T0032,T0042,T0050,,, -,T0069,,,T0014,,T0023,T0033,T0043,T0051,,, -,T0070,,,T0015,,T0024,T0034,T0044,T0052,,, -,,,,T0065,,T0025,T0035,T0045,T0053,,, -,,,,,,T0026,T0036,T0046,T0054,,, -,,,,,,T0027,T0037,,T0055,,, -,,,,,,T0028,T0038,,T0056,,, +P01,P01,P01,P02,P02,P02,P02,P02,P02,P03,P03,P03,P03,P03,P03,P04 +TA01,TA02,TA03,TA04,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16 +T0001,T0003,T0010,T0013,T0020,T0029,T0041,T0047,T0051,T0063,T0070,T0074,T0080,T0085,T0090,T0095 +T0002,T0004,T0011,T0014,T0021,T0030,T0042,T0048,T0052,T0064,T0071,T0075,T0081,T0086,T0091,T0096 +,T0005,T0012,T0015,T0022,T0031,T0043,T0049,T0053,T0065,T0072,T0076,T0082,T0087,T0092,T0097 +,T0006,,T0016,T0023,T0032,T0044,T0050,T0054,T0066,T0073,T0077,T0083,T0088,T0093, +,T0007,,T0017,T0024,T0033,T0045,,T0055,T0067,,T0078,T0084,T0089,T0094, +,T0008,,T0018,T0025,T0034,T0046,,T0056,T0068,,T0079,,,, +,T0009,,T0019,T0026,T0035,,,T0057,T0069,,,,,, +,,,,T0027,T0036,,,T0058,,,,,,, +,,,,T0028,T0037,,,T0059,,,,,,, +,,,,,T0038,,,T0060,,,,,,, +,,,,,T0039,,,T0061,,,,,,, +,,,,,T0040,,,T0062,,,,,,, diff --git a/generated_pages/counters/C00006.md b/generated_pages/counters/C00006.md index ef00e3c..731c404 100644 --- a/generated_pages/counters/C00006.md +++ b/generated_pages/counters/C00006.md @@ -1,6 +1,6 @@ # Counter C00006: Charge for social media -* **Summary**: Include a paid-for privacy option, e.g. pay Facebook for an option of them not collecting your personal information. There are examples of this not work, e.g. most people don’t use proton mail etc. +* **Summary**: Include a paid-for privacy option, e.g. pay Facebook for an option of them not collecting your personal information. There are examples of this not working, e.g. most people don’t use proton mail etc. * **Playbooks**: @@ -24,12 +24,12 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | diff --git a/generated_pages/counters/C00008.md b/generated_pages/counters/C00008.md index da2f3d2..4a479c8 100644 --- a/generated_pages/counters/C00008.md +++ b/generated_pages/counters/C00008.md @@ -1,6 +1,6 @@ # Counter C00008: Create shared fact-checking database -* **Summary**: Share fact-checking resources - tips, responses, countermessages, across respose groups. Snopes is best-known example of fact-checking sites. +* **Summary**: Share fact-checking resources - tips, responses, countermessages, across respose groups. * **Playbooks**: @@ -24,24 +24,24 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00009.md b/generated_pages/counters/C00009.md index 02db14e..07b44fb 100644 --- a/generated_pages/counters/C00009.md +++ b/generated_pages/counters/C00009.md @@ -25,15 +25,15 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0042 Kernel of Truth](../generated_pages/techniques/T0042.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00010.md b/generated_pages/counters/C00010.md index 8e8f0a9..ecfb4bd 100644 --- a/generated_pages/counters/C00010.md +++ b/generated_pages/counters/C00010.md @@ -24,7 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | +| [T0005 Distract](../generated_pages/techniques/T0005.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00011.md b/generated_pages/counters/C00011.md index cf5f0de..9518fba 100644 --- a/generated_pages/counters/C00011.md +++ b/generated_pages/counters/C00011.md @@ -26,23 +26,23 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00012.md b/generated_pages/counters/C00012.md index 2b989d7..50d4240 100644 --- a/generated_pages/counters/C00012.md +++ b/generated_pages/counters/C00012.md @@ -1,6 +1,6 @@ # Counter C00012: Platform regulation -* **Summary**: Empower existing regulators to govern social media. Also covers Destroy. Includes: Include the role of social media in the regulatory framework for media - The European Union created significant new regulations in 2018; the U.S. approach will need to be carefully crafted to protect First Amendment principles, create needed transparency, ensure liability, and impose costs for noncompliance. Includes Create policy that makes social media police disinformation - example: German model: facebook forced to police content by law. Includes: Use fraud legislation to clean up social media +* **Summary**: Empower existing regulators to govern social media. Also covers Destroy. Includes: Include the role of social media in the regulatory framework for media. The U.S. approach will need to be carefully crafted to protect First Amendment principles, create needed transparency, ensure liability, and impose costs for noncompliance. Includes Create policy that makes social media police disinformation. Includes: Use fraud legislation to clean up social media * **Playbooks**: @@ -26,38 +26,38 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0047 Muzzle social media as a political force](../generated_pages/techniques/T0047.md) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00013.md b/generated_pages/counters/C00013.md index 00e559a..8921a6e 100644 --- a/generated_pages/counters/C00013.md +++ b/generated_pages/counters/C00013.md @@ -23,13 +23,13 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | diff --git a/generated_pages/counters/C00014.md b/generated_pages/counters/C00014.md index 086d4ca..27996e1 100644 --- a/generated_pages/counters/C00014.md +++ b/generated_pages/counters/C00014.md @@ -1,6 +1,6 @@ # Counter C00014: Real-time updates to fact-checking database -* **Summary**: Update fact-checking databases and resources in real time. Especially import for time-limited events like natural disasters. Existing examples at Buzzfeed and Fema. +* **Summary**: Update fact-checking databases and resources in real time. Especially import for time-limited events like natural disasters. * **Playbooks**: @@ -24,24 +24,24 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00016.md b/generated_pages/counters/C00016.md index c423204..f9b0164 100644 --- a/generated_pages/counters/C00016.md +++ b/generated_pages/counters/C00016.md @@ -24,37 +24,37 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00017.md b/generated_pages/counters/C00017.md index a32133a..8105ff1 100644 --- a/generated_pages/counters/C00017.md +++ b/generated_pages/counters/C00017.md @@ -24,13 +24,13 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | diff --git a/generated_pages/counters/C00019.md b/generated_pages/counters/C00019.md index a4f90fe..5577e55 100644 --- a/generated_pages/counters/C00019.md +++ b/generated_pages/counters/C00019.md @@ -23,17 +23,17 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00021.md b/generated_pages/counters/C00021.md index f319f13..c858e45 100644 --- a/generated_pages/counters/C00021.md +++ b/generated_pages/counters/C00021.md @@ -23,16 +23,16 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00022.md b/generated_pages/counters/C00022.md index bcc59fc..c944d92 100644 --- a/generated_pages/counters/C00022.md +++ b/generated_pages/counters/C00022.md @@ -23,16 +23,16 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00024.md b/generated_pages/counters/C00024.md index 7771c2a..a9c94d1 100644 --- a/generated_pages/counters/C00024.md +++ b/generated_pages/counters/C00024.md @@ -23,16 +23,16 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00026.md b/generated_pages/counters/C00026.md index 0fc7892..5ec99be 100644 --- a/generated_pages/counters/C00026.md +++ b/generated_pages/counters/C00026.md @@ -1,6 +1,6 @@ # Counter C00026: Shore up democracy based messages -* **Summary**: Messages about e.g. peace, freedom. And make it sexy. Includes Deploy Information and Narrative-Building in Service of Statecraft: Promote a narrative of transparency, truthfulness, liberal values, and democracy. Implement a compelling narrative via effective mechanisms of communication. Continually reassess U.S. messages, mechanisms, and audiences over time. Counteract efforts to manipulate media, undermine free markets, and suppress political freedoms via public diplomacy +* **Summary**: Messages about e.g. peace, freedom. And make it sexy. Includes Deploy Information and Narrative-Building in Service of Statecraft: Promote a narrative of transparency, truthfulness, liberal values, and democracy. Implement a compelling narrative via effective mechanisms of communication. Continually reassess messages, mechanisms, and audiences over time. Counteract efforts to manipulate media, undermine free markets, and suppress political freedoms via public diplomacy * **Playbooks**: @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | diff --git a/generated_pages/counters/C00027.md b/generated_pages/counters/C00027.md index fa425d1..11ea50e 100644 --- a/generated_pages/counters/C00027.md +++ b/generated_pages/counters/C00027.md @@ -23,19 +23,19 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | diff --git a/generated_pages/counters/C00029.md b/generated_pages/counters/C00029.md index 4a24737..1eb11f1 100644 --- a/generated_pages/counters/C00029.md +++ b/generated_pages/counters/C00029.md @@ -23,12 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00030.md b/generated_pages/counters/C00030.md index cffc919..f38fcae 100644 --- a/generated_pages/counters/C00030.md +++ b/generated_pages/counters/C00030.md @@ -1,7 +1,6 @@ # Counter C00030: Develop a compelling counter narrative (truth based) -* **Summary**: Example: Reality Team. -https://www.isdglobal.org/wp-content/uploads/2016/06/Counter-narrative-Handbook_1.pdf +* **Summary**: * **Playbooks**: @@ -24,12 +23,12 @@ https://www.isdglobal.org/wp-content/uploads/2016/06/Counter-narrative-Handbook_ | Counters these Techniques | | ------------------------- | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00031.md b/generated_pages/counters/C00031.md index 444ab62..549b536 100644 --- a/generated_pages/counters/C00031.md +++ b/generated_pages/counters/C00031.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | diff --git a/generated_pages/counters/C00032.md b/generated_pages/counters/C00032.md index db80f33..72fa9de 100644 --- a/generated_pages/counters/C00032.md +++ b/generated_pages/counters/C00032.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | diff --git a/generated_pages/counters/C00034.md b/generated_pages/counters/C00034.md index 03fff2d..b243baa 100644 --- a/generated_pages/counters/C00034.md +++ b/generated_pages/counters/C00034.md @@ -23,10 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0012 Use concealment](../generated_pages/techniques/T0012.md) | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | diff --git a/generated_pages/counters/C00036.md b/generated_pages/counters/C00036.md index 32faf06..f993eee 100644 --- a/generated_pages/counters/C00036.md +++ b/generated_pages/counters/C00036.md @@ -23,13 +23,14 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0012 Use concealment](../generated_pages/techniques/T0012.md) | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | +| [T0005 Distract](../generated_pages/techniques/T0005.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00040.md b/generated_pages/counters/C00040.md index 2ea6bc2..411c461 100644 --- a/generated_pages/counters/C00040.md +++ b/generated_pages/counters/C00040.md @@ -23,9 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0012 Use concealment](../generated_pages/techniques/T0012.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | diff --git a/generated_pages/counters/C00042.md b/generated_pages/counters/C00042.md index e13f5a5..27b6c28 100644 --- a/generated_pages/counters/C00042.md +++ b/generated_pages/counters/C00042.md @@ -23,15 +23,15 @@ | Counters these Techniques | | ------------------------- | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0042 Kernel of Truth](../generated_pages/techniques/T0042.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0059 Play the long game](../generated_pages/techniques/T0059.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0059 Online polls](../generated_pages/techniques/T0059.md) | diff --git a/generated_pages/counters/C00044.md b/generated_pages/counters/C00044.md index 15bf342..33be3a1 100644 --- a/generated_pages/counters/C00044.md +++ b/generated_pages/counters/C00044.md @@ -24,14 +24,14 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | diff --git a/generated_pages/counters/C00046.md b/generated_pages/counters/C00046.md index 633a2a5..ea72f1b 100644 --- a/generated_pages/counters/C00046.md +++ b/generated_pages/counters/C00046.md @@ -23,23 +23,23 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00047.md b/generated_pages/counters/C00047.md index 31da362..0f142d3 100644 --- a/generated_pages/counters/C00047.md +++ b/generated_pages/counters/C00047.md @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | -| [T0062 Behaviour changes](../generated_pages/techniques/T0062.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | +| [T0062 Email](../generated_pages/techniques/T0062.md) | diff --git a/generated_pages/counters/C00048.md b/generated_pages/counters/C00048.md index a484a5a..9e02ab6 100644 --- a/generated_pages/counters/C00048.md +++ b/generated_pages/counters/C00048.md @@ -1,6 +1,6 @@ # Counter C00048: Name and Shame Influencers -* **Summary**: Think about the different levels: individual vs state-sponsored account. Includes “call them out” and “name and shame”. Note that USAID operations were at a different level. Identify social media accounts as sources of propaganda—“calling them out”— might be helpful to prevent the spread of their message to audiences that otherwise would consider them factual. USAID has been restructuring its programs to address predatory Chinese development projects and the information operations that support them. USAID’s new strategy has tailored programs to counter Chinese educational exchange programs and to support free and fair elections, youth empowerment, democratic governance, and free press. USAID’s Russia regional teams have also been compiling a strategy for Russia’s information operations. One strong point of USAID’s programming is a system of indicators and measurements for a country’s vulnerability to foreign influence and information operations. Identify, monitor, and, if necessary, target externally-based nonattributed social media accounts. Impact of and Dealing with Trolls - "Chatham House has observed that trolls also sometimes function as decoys, as a way of “keeping the infantry busy” that “aims to wear down the other side” (Lough et al., 2014). Another type of troll involves “false accounts posing as authoritative information sources on social media”. +* **Summary**: Think about the different levels: individual vs state-sponsored account. Includes “call them out” and “name and shame”. Identify social media accounts as sources of propaganda—“calling them out”— might be helpful to prevent the spread of their message to audiences that otherwise would consider them factual. Identify, monitor, and, if necessary, target externally-based nonattributed social media accounts. Impact of and Dealing with Trolls - "Chatham House has observed that trolls also sometimes function as decoys, as a way of “keeping the infantry busy” that “aims to wear down the other side” (Lough et al., 2014). Another type of troll involves “false accounts posing as authoritative information sources on social media”. * **Playbooks**: @@ -23,17 +23,17 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00051.md b/generated_pages/counters/C00051.md index 80e190a..6751a95 100644 --- a/generated_pages/counters/C00051.md +++ b/generated_pages/counters/C00051.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0012 Use concealment](../generated_pages/techniques/T0012.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | diff --git a/generated_pages/counters/C00052.md b/generated_pages/counters/C00052.md index a57a215..3cbe308 100644 --- a/generated_pages/counters/C00052.md +++ b/generated_pages/counters/C00052.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0012 Use concealment](../generated_pages/techniques/T0012.md) | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | +| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | diff --git a/generated_pages/counters/C00053.md b/generated_pages/counters/C00053.md index 89a40fe..2d0021e 100644 --- a/generated_pages/counters/C00053.md +++ b/generated_pages/counters/C00053.md @@ -26,8 +26,8 @@ | Counters these Techniques | | ------------------------- | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | diff --git a/generated_pages/counters/C00058.md b/generated_pages/counters/C00058.md index 531634a..2068c11 100644 --- a/generated_pages/counters/C00058.md +++ b/generated_pages/counters/C00058.md @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00059.md b/generated_pages/counters/C00059.md index c2428f7..6199254 100644 --- a/generated_pages/counters/C00059.md +++ b/generated_pages/counters/C00059.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | diff --git a/generated_pages/counters/C00060.md b/generated_pages/counters/C00060.md index 486d1ba..b31cc05 100644 --- a/generated_pages/counters/C00060.md +++ b/generated_pages/counters/C00060.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0047 Muzzle social media as a political force](../generated_pages/techniques/T0047.md) | +| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | diff --git a/generated_pages/counters/C00065.md b/generated_pages/counters/C00065.md index 30f9d7a..9f1eb0a 100644 --- a/generated_pages/counters/C00065.md +++ b/generated_pages/counters/C00065.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00066.md b/generated_pages/counters/C00066.md index a7a2b1c..3f59a46 100644 --- a/generated_pages/counters/C00066.md +++ b/generated_pages/counters/C00066.md @@ -1,6 +1,6 @@ # Counter C00066: Co-opt a hashtag and drown it out (hijack it back) -* **Summary**: Flood a disinformation-related hashtag with other content. Examples include kPop stans flooding extremist hashtags with pop videos and images. +* **Summary**: Flood a disinformation-related hashtag with other content. * **Playbooks**: @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | diff --git a/generated_pages/counters/C00067.md b/generated_pages/counters/C00067.md index e02137a..4795d28 100644 --- a/generated_pages/counters/C00067.md +++ b/generated_pages/counters/C00067.md @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00070.md b/generated_pages/counters/C00070.md index 7f08c79..94b4ff9 100644 --- a/generated_pages/counters/C00070.md +++ b/generated_pages/counters/C00070.md @@ -2,7 +2,7 @@ * **Summary**: Resources = accounts, channels etc. Block access to platform. DDOS an attacker. -TA02*: DDOS at the critical time (ie. midterm-2018 elections DDOS against troll farms) to deny an adversary's time-bound objective. +TA02*: DDOS at the critical time, to deny an adversary's time-bound objective. T0008: A quick response to a proto-viral story will affect it's ability to spread and raise questions about their legitimacy. @@ -31,16 +31,16 @@ T0046 - Search Engine Optimization: Sub-optimal website performance affect its s | Counters these Techniques | | ------------------------- | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | diff --git a/generated_pages/counters/C00071.md b/generated_pages/counters/C00071.md index 61059a1..0cb6ea9 100644 --- a/generated_pages/counters/C00071.md +++ b/generated_pages/counters/C00071.md @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00072.md b/generated_pages/counters/C00072.md index 9f3014b..b061f01 100644 --- a/generated_pages/counters/C00072.md +++ b/generated_pages/counters/C00072.md @@ -23,16 +23,16 @@ | Counters these Techniques | | ------------------------- | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00073.md b/generated_pages/counters/C00073.md index 64529fb..338e044 100644 --- a/generated_pages/counters/C00073.md +++ b/generated_pages/counters/C00073.md @@ -1,6 +1,6 @@ # Counter C00073: Inoculate populations through media literacy training -* **Summary**: Use training to build the resilience of at-risk populations. Educate on how to handle info pollution. Push out targeted education on why it's pollution. Build cultural resistance to false content, e.g. cultural resistance to bullshit. Influence literacy training, to inoculate against “cult” recruiting. Media literacy training: leverage librarians / library for media literacy training. Inoculate at language. Strategic planning included as inoculating population has strategic value. Example is the "Learn to Discern" Program, funded by the Canadian government, operated in Ukraine from July 2015 to March 2016. The program trained 15,000 Ukrainians in ‘’safe, informed media consumption techniques,’’ including avoiding emotional manipulation, verifying sources, identifying hate speech, verifying expert credentials, detecting censorship, and debunking news, photos, and videos.” Example: NGO Baltic Centre for Media Excellence, with some international funding, provides training to journalists in the Baltics and conducts media literacy training in the region. In addition to helping journalists avoid becoming “unwitting multipliers of misleading information,” the organization works with school teachers in the region to help them “decode media and incorporate media research into teaching.” concepts of media literacy to a mass audience that authorities launch a public information campaign that teaches the program will take time to develop and establish impact, recommends curriculum-based training. Covers detect, deny, and degrade. +* **Summary**: Use training to build the resilience of at-risk populations. Educate on how to handle info pollution. Push out targeted education on why it's pollution. Build cultural resistance to false content, e.g. cultural resistance to bullshit. Influence literacy training, to inoculate against “cult” recruiting. Media literacy training: leverage librarians / library for media literacy training. Inoculate at language. Strategic planning included as inoculating population has strategic value. Concepts of media literacy to a mass audience that authorities launch a public information campaign that teaches the program will take time to develop and establish impact, recommends curriculum-based training. Covers detect, deny, and degrade. * **Playbooks**: @@ -31,24 +31,24 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0040 Demand unsurmountable proof](../generated_pages/techniques/T0040.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00074.md b/generated_pages/counters/C00074.md index e250ed9..356190d 100644 --- a/generated_pages/counters/C00074.md +++ b/generated_pages/counters/C00074.md @@ -25,22 +25,22 @@ | Counters these Techniques | | ------------------------- | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00076.md b/generated_pages/counters/C00076.md index 9ab847a..42fb399 100644 --- a/generated_pages/counters/C00076.md +++ b/generated_pages/counters/C00076.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | diff --git a/generated_pages/counters/C00078.md b/generated_pages/counters/C00078.md index 3f00ce0..fda7724 100644 --- a/generated_pages/counters/C00078.md +++ b/generated_pages/counters/C00078.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00080.md b/generated_pages/counters/C00080.md index 83ef1f5..d5a4696 100644 --- a/generated_pages/counters/C00080.md +++ b/generated_pages/counters/C00080.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | diff --git a/generated_pages/counters/C00081.md b/generated_pages/counters/C00081.md index cd81216..01a98f1 100644 --- a/generated_pages/counters/C00081.md +++ b/generated_pages/counters/C00081.md @@ -23,19 +23,19 @@ | Counters these Techniques | | ------------------------- | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00082.md b/generated_pages/counters/C00082.md index 4777eea..faffb28 100644 --- a/generated_pages/counters/C00082.md +++ b/generated_pages/counters/C00082.md @@ -1,6 +1,6 @@ # Counter C00082: Ground truthing as automated response to pollution -* **Summary**: e.g. RealityTeam work that adds clear information to spaces with disinformation in. Also inoculation. +* **Summary**: Also inoculation. * **Playbooks**: @@ -23,21 +23,21 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00084.md b/generated_pages/counters/C00084.md index 9aca807..c89e028 100644 --- a/generated_pages/counters/C00084.md +++ b/generated_pages/counters/C00084.md @@ -23,14 +23,14 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0059 Play the long game](../generated_pages/techniques/T0059.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0059 Online polls](../generated_pages/techniques/T0059.md) | diff --git a/generated_pages/counters/C00085.md b/generated_pages/counters/C00085.md index 747bddf..7ede1be 100644 --- a/generated_pages/counters/C00085.md +++ b/generated_pages/counters/C00085.md @@ -25,26 +25,26 @@ Online archives of content (archives of websites, social media profiles, media, | Counters these Techniques | | ------------------------- | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00086.md b/generated_pages/counters/C00086.md index ec95b19..33dc49c 100644 --- a/generated_pages/counters/C00086.md +++ b/generated_pages/counters/C00086.md @@ -2,8 +2,6 @@ * **Summary**: Example: Interject addictive links or contents into discussions of disinformation materials and measure a "conversion rate" of users who engage with your content and away from the social media channel's "information bubble" around the disinformation item. Use bots to amplify and upvote the addictive content. -Note: This sounds eerlily like many Reddit communities where the most upvoted comments are all jokes, preventing serious discussion from being discovered by those who filter by upvotes. - * **Playbooks**: * **Metatechnique**: M002 - diversion @@ -25,13 +23,13 @@ Note: This sounds eerlily like many Reddit communities where the most upvoted co | Counters these Techniques | | ------------------------- | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | diff --git a/generated_pages/counters/C00087.md b/generated_pages/counters/C00087.md index 8637c19..70615d9 100644 --- a/generated_pages/counters/C00087.md +++ b/generated_pages/counters/C00087.md @@ -1,6 +1,6 @@ # Counter C00087: Make more noise than the disinformation -* **Summary**: Examples: kPop stans, #proudboys takeover by LGBT community +* **Summary**: * **Playbooks**: @@ -23,17 +23,17 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00090.md b/generated_pages/counters/C00090.md index e5d37b8..edb6a5a 100644 --- a/generated_pages/counters/C00090.md +++ b/generated_pages/counters/C00090.md @@ -23,9 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | -| [T0062 Behaviour changes](../generated_pages/techniques/T0062.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | +| [T0062 Email](../generated_pages/techniques/T0062.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | diff --git a/generated_pages/counters/C00091.md b/generated_pages/counters/C00091.md index b487fbc..b62f502 100644 --- a/generated_pages/counters/C00091.md +++ b/generated_pages/counters/C00091.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0062 Behaviour changes](../generated_pages/techniques/T0062.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | +| [T0062 Email](../generated_pages/techniques/T0062.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00092.md b/generated_pages/counters/C00092.md index 0b95cb9..4ac38ee 100644 --- a/generated_pages/counters/C00092.md +++ b/generated_pages/counters/C00092.md @@ -24,14 +24,14 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00093.md b/generated_pages/counters/C00093.md index 5acda7b..aa2b51f 100644 --- a/generated_pages/counters/C00093.md +++ b/generated_pages/counters/C00093.md @@ -1,6 +1,6 @@ # Counter C00093: Influencer code of conduct -* **Summary**: Establish tailored code of conduct for individuals with many followers. Can be platform code of conduct; can also be community code, e.g. the Pro-Truth Pledge. +* **Summary**: Establish tailored code of conduct for individuals with many followers. Can be platform code of conduct; can also be community code. * **Playbooks**: @@ -23,12 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0047 Muzzle social media as a political force](../generated_pages/techniques/T0047.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | diff --git a/generated_pages/counters/C00094.md b/generated_pages/counters/C00094.md index 9fdc400..f06c435 100644 --- a/generated_pages/counters/C00094.md +++ b/generated_pages/counters/C00094.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | diff --git a/generated_pages/counters/C00096.md b/generated_pages/counters/C00096.md index 9d2d15d..a710c68 100644 --- a/generated_pages/counters/C00096.md +++ b/generated_pages/counters/C00096.md @@ -23,12 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters/C00097.md b/generated_pages/counters/C00097.md index be042ba..6cd7d93 100644 --- a/generated_pages/counters/C00097.md +++ b/generated_pages/counters/C00097.md @@ -24,13 +24,13 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | diff --git a/generated_pages/counters/C00098.md b/generated_pages/counters/C00098.md index 0540299..9c0030e 100644 --- a/generated_pages/counters/C00098.md +++ b/generated_pages/counters/C00098.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0038 Twitter](../generated_pages/techniques/T0038.md) | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | +| [T0038 Develop Owned Media Assets](../generated_pages/techniques/T0038.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00099.md b/generated_pages/counters/C00099.md index d0a4130..846319d 100644 --- a/generated_pages/counters/C00099.md +++ b/generated_pages/counters/C00099.md @@ -24,11 +24,11 @@ | Counters these Techniques | | ------------------------- | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | diff --git a/generated_pages/counters/C00100.md b/generated_pages/counters/C00100.md index eb79ea6..425c5c5 100644 --- a/generated_pages/counters/C00100.md +++ b/generated_pages/counters/C00100.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | diff --git a/generated_pages/counters/C00101.md b/generated_pages/counters/C00101.md index faad9e5..c55d315 100644 --- a/generated_pages/counters/C00101.md +++ b/generated_pages/counters/C00101.md @@ -24,10 +24,10 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | diff --git a/generated_pages/counters/C00103.md b/generated_pages/counters/C00103.md index cb4eb75..d652497 100644 --- a/generated_pages/counters/C00103.md +++ b/generated_pages/counters/C00103.md @@ -24,10 +24,10 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | -| [T0062 Behaviour changes](../generated_pages/techniques/T0062.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | +| [T0062 Email](../generated_pages/techniques/T0062.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | diff --git a/generated_pages/counters/C00105.md b/generated_pages/counters/C00105.md index 6e6e4b2..c428b0d 100644 --- a/generated_pages/counters/C00105.md +++ b/generated_pages/counters/C00105.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00106.md b/generated_pages/counters/C00106.md index b3493b2..d9e8baa 100644 --- a/generated_pages/counters/C00106.md +++ b/generated_pages/counters/C00106.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | diff --git a/generated_pages/counters/C00107.md b/generated_pages/counters/C00107.md index 3963928..37ca503 100644 --- a/generated_pages/counters/C00107.md +++ b/generated_pages/counters/C00107.md @@ -24,26 +24,26 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00111.md b/generated_pages/counters/C00111.md index 087dd1b..59abe55 100644 --- a/generated_pages/counters/C00111.md +++ b/generated_pages/counters/C00111.md @@ -1,6 +1,6 @@ # Counter C00111: Reduce polarisation by connecting and presenting sympathetic renditions of opposite views -* **Summary**: Example: The Commons Project (BuildUp) work. +* **Summary**: * **Playbooks**: @@ -25,7 +25,7 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00112.md b/generated_pages/counters/C00112.md index 8673ac5..4754dc4 100644 --- a/generated_pages/counters/C00112.md +++ b/generated_pages/counters/C00112.md @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0040 Demand unsurmountable proof](../generated_pages/techniques/T0040.md) | -| [T0042 Kernel of Truth](../generated_pages/techniques/T0042.md) | +| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | +| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | diff --git a/generated_pages/counters/C00113.md b/generated_pages/counters/C00113.md index b3fff71..277683e 100644 --- a/generated_pages/counters/C00113.md +++ b/generated_pages/counters/C00113.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00114.md b/generated_pages/counters/C00114.md index 39159b4..0777899 100644 --- a/generated_pages/counters/C00114.md +++ b/generated_pages/counters/C00114.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | diff --git a/generated_pages/counters/C00115.md b/generated_pages/counters/C00115.md index 3010eb3..807b697 100644 --- a/generated_pages/counters/C00115.md +++ b/generated_pages/counters/C00115.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0041 Deny involvement](../generated_pages/techniques/T0041.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00116.md b/generated_pages/counters/C00116.md index 539c1cb..dc2df61 100644 --- a/generated_pages/counters/C00116.md +++ b/generated_pages/counters/C00116.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0041 Deny involvement](../generated_pages/techniques/T0041.md) | +| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | diff --git a/generated_pages/counters/C00117.md b/generated_pages/counters/C00117.md index 137f8c2..23325f4 100644 --- a/generated_pages/counters/C00117.md +++ b/generated_pages/counters/C00117.md @@ -23,15 +23,15 @@ | Counters these Techniques | | ------------------------- | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00118.md b/generated_pages/counters/C00118.md index c449b79..bc3de73 100644 --- a/generated_pages/counters/C00118.md +++ b/generated_pages/counters/C00118.md @@ -23,9 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | diff --git a/generated_pages/counters/C00119.md b/generated_pages/counters/C00119.md index 113a851..4e998fa 100644 --- a/generated_pages/counters/C00119.md +++ b/generated_pages/counters/C00119.md @@ -23,14 +23,14 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00120.md b/generated_pages/counters/C00120.md index 84c27e0..617e045 100644 --- a/generated_pages/counters/C00120.md +++ b/generated_pages/counters/C00120.md @@ -23,12 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0047 Muzzle social media as a political force](../generated_pages/techniques/T0047.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00121.md b/generated_pages/counters/C00121.md index 047290c..5368037 100644 --- a/generated_pages/counters/C00121.md +++ b/generated_pages/counters/C00121.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | diff --git a/generated_pages/counters/C00122.md b/generated_pages/counters/C00122.md index d842150..f640fbe 100644 --- a/generated_pages/counters/C00122.md +++ b/generated_pages/counters/C00122.md @@ -24,30 +24,30 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00123.md b/generated_pages/counters/C00123.md index 287be9c..6291b75 100644 --- a/generated_pages/counters/C00123.md +++ b/generated_pages/counters/C00123.md @@ -23,10 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00124.md b/generated_pages/counters/C00124.md index 7e4bf5a..422ae16 100644 --- a/generated_pages/counters/C00124.md +++ b/generated_pages/counters/C00124.md @@ -25,8 +25,8 @@ | Counters these Techniques | | ------------------------- | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | diff --git a/generated_pages/counters/C00125.md b/generated_pages/counters/C00125.md index f4c5187..0cd1796 100644 --- a/generated_pages/counters/C00125.md +++ b/generated_pages/counters/C00125.md @@ -23,18 +23,18 @@ | Counters these Techniques | | ------------------------- | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00126.md b/generated_pages/counters/C00126.md index f64279f..6a008fa 100644 --- a/generated_pages/counters/C00126.md +++ b/generated_pages/counters/C00126.md @@ -23,19 +23,19 @@ | Counters these Techniques | | ------------------------- | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00128.md b/generated_pages/counters/C00128.md index 9f6886d..ecd67fd 100644 --- a/generated_pages/counters/C00128.md +++ b/generated_pages/counters/C00128.md @@ -24,15 +24,15 @@ | Counters these Techniques | | ------------------------- | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00129.md b/generated_pages/counters/C00129.md index c39fa2a..97548e1 100644 --- a/generated_pages/counters/C00129.md +++ b/generated_pages/counters/C00129.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00130.md b/generated_pages/counters/C00130.md index 3082fcc..8a6239c 100644 --- a/generated_pages/counters/C00130.md +++ b/generated_pages/counters/C00130.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00131.md b/generated_pages/counters/C00131.md index 65c34be..846c717 100644 --- a/generated_pages/counters/C00131.md +++ b/generated_pages/counters/C00131.md @@ -24,9 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00133.md b/generated_pages/counters/C00133.md index 85b7fd2..501f8cc 100644 --- a/generated_pages/counters/C00133.md +++ b/generated_pages/counters/C00133.md @@ -24,11 +24,11 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00135.md b/generated_pages/counters/C00135.md index ba4cb7e..6756822 100644 --- a/generated_pages/counters/C00135.md +++ b/generated_pages/counters/C00135.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | diff --git a/generated_pages/counters/C00136.md b/generated_pages/counters/C00136.md index e30c315..d0d2a81 100644 --- a/generated_pages/counters/C00136.md +++ b/generated_pages/counters/C00136.md @@ -23,9 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | diff --git a/generated_pages/counters/C00138.md b/generated_pages/counters/C00138.md index 4fa20d4..2ef8e95 100644 --- a/generated_pages/counters/C00138.md +++ b/generated_pages/counters/C00138.md @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | diff --git a/generated_pages/counters/C00142.md b/generated_pages/counters/C00142.md index 8bc2589..9bbc690 100644 --- a/generated_pages/counters/C00142.md +++ b/generated_pages/counters/C00142.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | diff --git a/generated_pages/counters/C00143.md b/generated_pages/counters/C00143.md index 95e8d71..ae30758 100644 --- a/generated_pages/counters/C00143.md +++ b/generated_pages/counters/C00143.md @@ -25,9 +25,9 @@ | Counters these Techniques | | ------------------------- | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | diff --git a/generated_pages/counters/C00144.md b/generated_pages/counters/C00144.md index a8f0f0d..38ce103 100644 --- a/generated_pages/counters/C00144.md +++ b/generated_pages/counters/C00144.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | diff --git a/generated_pages/counters/C00147.md b/generated_pages/counters/C00147.md index 6ae0715..f854193 100644 --- a/generated_pages/counters/C00147.md +++ b/generated_pages/counters/C00147.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00148.md b/generated_pages/counters/C00148.md index bb8f587..cab0104 100644 --- a/generated_pages/counters/C00148.md +++ b/generated_pages/counters/C00148.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0062 Behaviour changes](../generated_pages/techniques/T0062.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | +| [T0062 Email](../generated_pages/techniques/T0062.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | diff --git a/generated_pages/counters/C00149.md b/generated_pages/counters/C00149.md index 9c26b94..fa0475a 100644 --- a/generated_pages/counters/C00149.md +++ b/generated_pages/counters/C00149.md @@ -23,10 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | diff --git a/generated_pages/counters/C00153.md b/generated_pages/counters/C00153.md index 94603b4..000b42c 100644 --- a/generated_pages/counters/C00153.md +++ b/generated_pages/counters/C00153.md @@ -24,21 +24,21 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00154.md b/generated_pages/counters/C00154.md index 1ae7a1d..4170d40 100644 --- a/generated_pages/counters/C00154.md +++ b/generated_pages/counters/C00154.md @@ -24,9 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00155.md b/generated_pages/counters/C00155.md index e227eec..3f1d890 100644 --- a/generated_pages/counters/C00155.md +++ b/generated_pages/counters/C00155.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | diff --git a/generated_pages/counters/C00156.md b/generated_pages/counters/C00156.md index 6a959ea..e45a5c6 100644 --- a/generated_pages/counters/C00156.md +++ b/generated_pages/counters/C00156.md @@ -1,6 +1,6 @@ # Counter C00156: Better tell your country or organization story -* **Summary**: Civil engagement activities conducted on the part of EFP forces. In Latvia, for example, U.S. soldiers have reportedly conducted numerous civil engagements with the local populations. In one example, soldiers cut firewood for local Russian-speaking Latvians. Locals were reportedly overheard saying, “A Russian soldier wouldn’t do that.” NATO should likewise provide support and training, where needed, to local public affairs and other communication personnel. Local government and military public affairs personnel can play their part in creating and disseminating entertaining and sharable content that supports the EFP mission. +* **Summary**: Civil engagement activities conducted on the part of EFP forces. NATO should likewise provide support and training, where needed, to local public affairs and other communication personnel. Local government and military public affairs personnel can play their part in creating and disseminating entertaining and sharable content that supports the EFP mission. * **Playbooks**: @@ -25,12 +25,12 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00160.md b/generated_pages/counters/C00160.md index df222e8..10f6f2c 100644 --- a/generated_pages/counters/C00160.md +++ b/generated_pages/counters/C00160.md @@ -25,9 +25,9 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | diff --git a/generated_pages/counters/C00161.md b/generated_pages/counters/C00161.md index cdee524..1345d6a 100644 --- a/generated_pages/counters/C00161.md +++ b/generated_pages/counters/C00161.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | diff --git a/generated_pages/counters/C00162.md b/generated_pages/counters/C00162.md index 778a896..2735059 100644 --- a/generated_pages/counters/C00162.md +++ b/generated_pages/counters/C00162.md @@ -23,16 +23,16 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | diff --git a/generated_pages/counters/C00164.md b/generated_pages/counters/C00164.md index 81aefc3..3b5f290 100644 --- a/generated_pages/counters/C00164.md +++ b/generated_pages/counters/C00164.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | diff --git a/generated_pages/counters/C00165.md b/generated_pages/counters/C00165.md index ee66fd9..f168139 100644 --- a/generated_pages/counters/C00165.md +++ b/generated_pages/counters/C00165.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters/C00169.md b/generated_pages/counters/C00169.md index 1ed776b..04bbdb5 100644 --- a/generated_pages/counters/C00169.md +++ b/generated_pages/counters/C00169.md @@ -23,13 +23,13 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | diff --git a/generated_pages/counters/C00172.md b/generated_pages/counters/C00172.md index c3afb27..86c4c07 100644 --- a/generated_pages/counters/C00172.md +++ b/generated_pages/counters/C00172.md @@ -24,9 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | diff --git a/generated_pages/counters/C00174.md b/generated_pages/counters/C00174.md index 574874d..caa4e0a 100644 --- a/generated_pages/counters/C00174.md +++ b/generated_pages/counters/C00174.md @@ -24,12 +24,12 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00176.md b/generated_pages/counters/C00176.md index 4e565ee..0c0d990 100644 --- a/generated_pages/counters/C00176.md +++ b/generated_pages/counters/C00176.md @@ -23,36 +23,36 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00178.md b/generated_pages/counters/C00178.md index ef8dbdd..68a569f 100644 --- a/generated_pages/counters/C00178.md +++ b/generated_pages/counters/C00178.md @@ -1,6 +1,6 @@ # Counter C00178: Fill information voids with non-disinformation content -* **Summary**: 1) Pollute the data voids with wholesome content (Kittens! Babyshark!). 2) fill data voids with relevant information, e.g. increase Russian-language programming in areas subject to Russian disinformation. Examples include using Current Time videos (viewed 40 million times online) to draw viewers away from Russian TV programming in RT and Sputnik. POtential content for this includes conventional entertainment programming (source: The conomist, “America’s Answer to Russian Propaganda TV,” 2017). +* **Summary**: 1) Pollute the data voids with wholesome content (Kittens! Babyshark!). 2) fill data voids with relevant information, e.g. increase Russian-language programming in areas subject to Russian disinformation. * **Playbooks**: @@ -23,10 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | diff --git a/generated_pages/counters/C00182.md b/generated_pages/counters/C00182.md index d385669..26e2467 100644 --- a/generated_pages/counters/C00182.md +++ b/generated_pages/counters/C00182.md @@ -1,6 +1,6 @@ # Counter C00182: Redirection / malware detection/ remediation -* **Summary**: Detect redirction or malware, then quarantine or delete. Example: (2015) Trustwave reported that a Bedep Trojan malware kit had begun infecting machines and forcing them to browse certain sites, artificially inflating traffic to a set of pro-Russia +* **Summary**: Detect redirction or malware, then quarantine or delete. * **Playbooks**: @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | diff --git a/generated_pages/counters/C00184.md b/generated_pages/counters/C00184.md index 39ffdb2..a519418 100644 --- a/generated_pages/counters/C00184.md +++ b/generated_pages/counters/C00184.md @@ -23,13 +23,13 @@ | Counters these Techniques | | ------------------------- | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0041 Deny involvement](../generated_pages/techniques/T0041.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00188.md b/generated_pages/counters/C00188.md index 9253d19..a0a1f9e 100644 --- a/generated_pages/counters/C00188.md +++ b/generated_pages/counters/C00188.md @@ -1,6 +1,6 @@ # Counter C00188: Newsroom/Journalist training to counter influence moves -* **Summary**: Includes SEO influence. August 2014, Russian news agency Rossiya Segodnya commissioned a poll in France with poorly worded questions and a statistically insignificant subsample that RT used to back a story titled “15% of French people back ISIS [Islamic State of Iraq and Syria] militants, poll finds.” The story and summary infographic circulated on the internet, initially appearing primarily on French sites. After a week, the generally respectable digital U.S. news outlet Vox ran the story, now titled “One in Six French People Say They Support ISIS.” Although this effect has now worn off or been overwritten, for a time—despite a later story from The Washington Post debunking the claim—typing “ISIS France” into Google resulted in an autosuggestion of “ISIS France support” (Borthwick, 2015). Includes promotion of a “higher standard of journalism”: journalism training “would be helpful, especially for the online community. Includes Strengthen local media: Improve effectiveness of local media outlets. Using eastern Latvia media outlets as an example, one expert noted that the media outlets are “very weak,” are often politically affiliated, or have “little local oligarchs that control them.” +* **Summary**: Includes SEO influence. Includes promotion of a “higher standard of journalism”: journalism training “would be helpful, especially for the online community. Includes Strengthen local media: Improve effectiveness of local media outlets. * **Playbooks**: @@ -25,15 +25,15 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | diff --git a/generated_pages/counters/C00189.md b/generated_pages/counters/C00189.md index 696f676..1b6f5d9 100644 --- a/generated_pages/counters/C00189.md +++ b/generated_pages/counters/C00189.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | diff --git a/generated_pages/counters/C00190.md b/generated_pages/counters/C00190.md index 3229ca0..872b1fd 100644 --- a/generated_pages/counters/C00190.md +++ b/generated_pages/counters/C00190.md @@ -24,12 +24,12 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters/C00195.md b/generated_pages/counters/C00195.md index 1d180d5..bb4e8c6 100644 --- a/generated_pages/counters/C00195.md +++ b/generated_pages/counters/C00195.md @@ -1,6 +1,6 @@ # Counter C00195: Redirect searches away from disinformation or extremist content -* **Summary**: Use Google AdWords to identify instances in which people search Google about particular fake-news stories or Russian propaganda themes. Taking advantage of the technology behind Google AdWords, this method identifies potential ISIS recruits through their Google searches and exposes them to curated YouTube videos debunking ISIS recruiting themes. Apply this method to Russian propaganda. Includes Monetize centrist SEO by subsidizing the difference in greater clicks towards extremist content. +* **Summary**: Use Google AdWords to identify instances in which people search Google about particular fake-news stories or propaganda themes. Includes Monetize centrist SEO by subsidizing the difference in greater clicks towards extremist content. * **Playbooks**: @@ -23,17 +23,17 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | diff --git a/generated_pages/counters/C00197.md b/generated_pages/counters/C00197.md index 6f1c048..ac73c21 100644 --- a/generated_pages/counters/C00197.md +++ b/generated_pages/counters/C00197.md @@ -25,9 +25,9 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00200.md b/generated_pages/counters/C00200.md index 3e7e2fa..65d306a 100644 --- a/generated_pages/counters/C00200.md +++ b/generated_pages/counters/C00200.md @@ -1,6 +1,6 @@ # Counter C00200: Respected figure (influencer) disavows misinfo -* **Summary**: Has been done in e.g. India. FIXIT: standardize language used for influencer/ respected figure. +* **Summary**: FIXIT: standardize language used for influencer/ respected figure. * **Playbooks**: @@ -24,11 +24,11 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters/C00202.md b/generated_pages/counters/C00202.md index cf26ef2..3fbb373 100644 --- a/generated_pages/counters/C00202.md +++ b/generated_pages/counters/C00202.md @@ -1,6 +1,6 @@ # Counter C00202: Set data 'honeytraps' -* **Summary**: Set honeytraps in content likely to be accessed for disinformation. NB Macron election team modified docs to spike a hack and leak. +* **Summary**: Set honeytraps in content likely to be accessed for disinformation. * **Playbooks**: @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters/C00203.md b/generated_pages/counters/C00203.md index 3caabf9..778d483 100644 --- a/generated_pages/counters/C00203.md +++ b/generated_pages/counters/C00203.md @@ -24,14 +24,14 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | diff --git a/generated_pages/counters/C00205.md b/generated_pages/counters/C00205.md index 996b190..ddeb8ac 100644 --- a/generated_pages/counters/C00205.md +++ b/generated_pages/counters/C00205.md @@ -25,11 +25,11 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | diff --git a/generated_pages/counters/C00207.md b/generated_pages/counters/C00207.md index b254098..68a7166 100644 --- a/generated_pages/counters/C00207.md +++ b/generated_pages/counters/C00207.md @@ -1,6 +1,6 @@ # Counter C00207: Run a competing disinformation campaign - not recommended -* **Summary**: E.g. Saudi tit-for-tat campaign +* **Summary**: * **Playbooks**: diff --git a/generated_pages/counters/C00211.md b/generated_pages/counters/C00211.md index 7bc09c7..0dbfb08 100644 --- a/generated_pages/counters/C00211.md +++ b/generated_pages/counters/C00211.md @@ -1,12 +1,6 @@ # Counter C00211: Use humorous counter-narratives -* **Summary**: Examples: - -* Baltic Elves. -https://balkaninsight.com/2019/06/07/disinformation-nation-the-slovaks-fighting-in-defence-of-facts/ -* Taiwan humor over rumor strategy.https://www.theguardian.com/commentisfree/2021/feb/17/humour-over-rumour-taiwan-fake-news -* Taiwan “humor over rumour" -https://internews.org/story/using-comedy-and-social-media-educate-disinformation +* **Summary**: * **Playbooks**: @@ -29,18 +23,18 @@ https://internews.org/story/using-comedy-and-social-media-educate-disinformation | Counters these Techniques | | ------------------------- | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00212.md b/generated_pages/counters/C00212.md index 9f8a283..faf5abe 100644 --- a/generated_pages/counters/C00212.md +++ b/generated_pages/counters/C00212.md @@ -25,10 +25,10 @@ | Counters these Techniques | | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00216.md b/generated_pages/counters/C00216.md index 53171a8..66e67a1 100644 --- a/generated_pages/counters/C00216.md +++ b/generated_pages/counters/C00216.md @@ -24,12 +24,12 @@ | Counters these Techniques | | ------------------------- | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00219.md b/generated_pages/counters/C00219.md index 20ab600..d2642cf 100644 --- a/generated_pages/counters/C00219.md +++ b/generated_pages/counters/C00219.md @@ -23,9 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters_index.md b/generated_pages/counters_index.md index 5ffc7b1..d55f556 100644 --- a/generated_pages/counters_index.md +++ b/generated_pages/counters_index.md @@ -920,7 +920,7 @@ Online archives of content (archives of websites, social media profiles, media, C00164 compatriot policy -protect the interests of a population and influence the population to not support disinformation causes and effectively influence the politics of its neighbors +protect the interests of this population and, more importantly, influence the population to support pro-Russia causes and effectively influence the politics of its neighbors M013 - targeting TA02 Objective Planning D03 @@ -936,7 +936,7 @@ Online archives of content (archives of websites, social media profiles, media, C00169 develop a creative content hub -Build funding and resources for producers and broadcasters to create content that counters disinformation and improves information landscapes. This could be a basket fund provided by international donors to a committee of local experts managing and distributing funding. +international donors will donate to a basket fund that will pay a committee of local experts who will, in turn, manage and distribute the money to Russian-language producers and broadcasters that pitch various projects. M010 - countermessaging TA02 Objective Planning D03 @@ -1039,8 +1039,8 @@ Online archives of content (archives of websites, social media profiles, media, C00200 -Influencer disavows misinfo -Influencer is a trusted or respected figure. +Respected figure (influencer) disavows misinfo +FIXIT: standardize language used for influencer/ respected figure. M010 - countermessaging TA09 Exposure D03 diff --git a/generated_pages/disarm_blue_framework.md b/generated_pages/disarm_blue_framework.md index 97f10e4..7a2293a 100644 --- a/generated_pages/disarm_blue_framework.md +++ b/generated_pages/disarm_blue_framework.md @@ -3,24 +3,26 @@ - - - - - - - - - - - - - + + + + + + + + + + + + + + + + - @@ -31,11 +33,14 @@ + + + + - @@ -46,11 +51,14 @@ + + + + - @@ -61,11 +69,14 @@ + + + + - @@ -76,11 +87,14 @@ + + + + - @@ -91,11 +105,14 @@ + + + + - @@ -106,11 +123,14 @@ + + + + - @@ -121,11 +141,14 @@ + + + + - @@ -136,11 +159,14 @@ + + + + - @@ -151,11 +177,14 @@ + + + + - @@ -166,18 +195,25 @@ + + + + - - + + + + + @@ -185,7 +221,6 @@ - @@ -196,11 +231,14 @@ + + + + - @@ -211,11 +249,14 @@ + + + + - @@ -226,11 +267,14 @@ + + + + - @@ -241,11 +285,14 @@ + + + + - @@ -256,11 +303,14 @@ + + + + - @@ -271,6 +321,10 @@ + + + + @@ -278,7 +332,6 @@ - @@ -286,6 +339,10 @@ + + + + @@ -293,7 +350,6 @@ - @@ -301,6 +357,10 @@ + + + + @@ -308,7 +368,6 @@ - @@ -316,6 +375,10 @@ + + + + @@ -323,7 +386,6 @@ - @@ -331,6 +393,10 @@ + + + + @@ -338,7 +404,6 @@ - @@ -346,6 +411,10 @@ + + + + @@ -353,7 +422,6 @@ - @@ -361,6 +429,10 @@ + + + + @@ -376,6 +448,9 @@ + + + @@ -391,6 +466,9 @@ + + + @@ -406,6 +484,9 @@ + + + @@ -421,6 +502,9 @@ + + + @@ -436,6 +520,9 @@ + + + diff --git a/generated_pages/disarm_red_framework.md b/generated_pages/disarm_red_framework.md index 8b9082f..c85851b 100644 --- a/generated_pages/disarm_red_framework.md +++ b/generated_pages/disarm_red_framework.md @@ -3,106 +3,145 @@
TA01 Strategic PlanningTA02 Objective PlanningTA13 Conduct Center of Gravity AnalysisTA03 Develop PeopleTA04 Develop NetworksTA05 MicrotargetingTA06 Develop ContentTA07 Channel SelectionTA08 Pump PrimingTA09 ExposureTA10 Drive Offline ActivityTA11 PersistenceTA12 Measure EffectivenessTA01 Plan StrategyTA02 Plan ObjectivesTA03 Target Audience AnalysisTA04 Develop NarrativesTA05 Develop ContentTA06 Establish Social AssetsTA07 Establish LegitimacyTA08 MicrotargetTA09 Select Channels and AffordancesTA10 Conduct Pump PrimingTA11 Deliver ContentTA12 Maximize ExposureTA13 Drive Online HarmsTA14 Drive Offline ActivityTA15 Persist in the Information EnvironmentTA16 Assess Effectiveness
C00006 Charge for social media C00009 Educate high profile influencers on best practices C00034 Create more friction at account creation C00047 Honeypot with coordinated inauthentics C00065 Reduce political targeting C00131 Seize and analyse botnet servers C00140 "Bomb" link shorteners with lots of calls
C00008 Create shared fact-checking database C00011 Media literacy. Games to identify fake news C00036 Infiltrate the in-group to discredit leaders (divide) C00052 Infiltrate platforms C00066 Co-opt a hashtag and drown it out (hijack it back) C00138 Spam domestic actors with lawsuits C00148 Add random links to network graphs
C00010 Enhanced privacy regulation for social media C00028 Make information provenance available C00040 third party verification for people C00053 Delete old accounts / Remove unused social media accounts C00130 Mentorship: elders, youth, credit. Learn vicariously. C00139 Weaponise youtube content matrices C00149 Poison the monitoring & evaluation data
C00012 Platform regulation C00029 Create fake website to issue counter narrative and counter narrative through physical merchandise C00042 Address truth contained in narratives C00056 Encourage people to leave social media C00178 Fill information voids with non-disinformation content C00143 (botnet) DMCA takedown requests to waste group time
C00013 Rating framework for news C00030 Develop a compelling counter narrative (truth based) C00044 Keep people from posting to social media immediately C00059 Verification of project before posting fund requests C00216 Use advertiser controls to stem flow of funds to bad actors
C00016 Censorship C00031 Dilute the core narrative - create multiple permutations, target / amplify C00046 Marginalise and discredit extremist groups C00062 Free open library sources worldwide
C00017 Repair broken social connections C00060 Legal action against for-profit engagement factories C00048 Name and Shame Influencers C00135 Deplatform message groups and/or message boards
C00019 Reduce effect of division-enablers C00070 Block access to disinformation resources C00051 Counter social engineering training C00162 Unravel/target the Potemkin villages
C00021 Encourage in-person communication C00092 Establish a truth teller reputation score for influencers C00058 Report crowdfunder as violator C00172 social media source removal
C00022 Innoculate. Positive campaign to promote feeling of safety C00144 Buy out troll farm employees / offer them jobs C00067 Denigrate the recipient/ project (of online funding) C00203 Stop offering press credentials to propaganda outlets
C00024 Promote healthy narratives C00156 Better tell your country or organization story C00077 Active defence: run TA03 "develop people” - not recommended C00082 Ground truthing as automated response to pollution C00121 Tool transparency and literacy for channels people follow. C00200 Influencer disavows misinfoC00200 Respected figure (influencer) disavows misinfo
C00026 Shore up democracy based messages C00164 compatriot policy C00093 Influencer code of conduct
C00027 Create culture of civility C00169 develop a creative content hub C00133 Deplatform Account*
C00073 Inoculate populations through media literacy training C00207 Run a competing disinformation campaign - not recommended C00155 Ban incident actors from funding sites
C00096 Strengthen institutions that are always truth tellers C00222 Tabletop simulations C00160 find and train influencers
C00111 Reduce polarisation by connecting and presenting sympathetic renditions of opposite views C00189 Ensure that platforms are taking down flagged accounts
C00153 Take pre-emptive action against actors' infrastructure C00197 remove suspicious accounts
C00159 Have a disinformation response plan C00106 Click-bait centrist content
C00161 Coalition Building with stakeholders and Third-Party Inducements C00107 Content moderation
C00170 elevate information as a critical domain of statecraft C00142 Platform adds warning label and decision point when sharing content
C00174 Create a healthier news environment C00165 Ensure integrity of official documents
C00176 Improve Coordination amongst stakeholders: public and private C00202 Set data 'honeytraps'
C00190 open engagement with civil society C00219 Add metadata to content that’s out of the control of disinformation creators
C00205 strong dialogue between the federal government and private sector to encourage better reporting
C00212 build public resilience by making civil society more vibrant
C00220 Develop a monitoring and intelligence plan
C00221 Run a disinformation red team, and design mitigation factors
C00223 Strengthen Trust in social media platforms
- - - - - - - - - - - - - + + + + + + + + + + + + + + + + - - - - - - - - - - - - - + + + + + + + + + + + + + + + + - - - - - - - - - - - - - + + + + + + + + + + + + + + + + - - - - - - - - - - - - + + + + + + + + + + + + + + + - - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - + + + + + - - - - - - + + - - - - - - - - - - - - @@ -112,12 +151,33 @@ - + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - @@ -128,11 +188,14 @@ + + + + + + + - - - - @@ -143,11 +206,14 @@ + + + + + + - - - @@ -158,11 +224,14 @@ + + + + + + - - - diff --git a/generated_pages/incidents/I00002.md b/generated_pages/incidents/I00002.md index b12c7a4..d9db342 100644 --- a/generated_pages/incidents/I00002.md +++ b/generated_pages/incidents/I00002.md @@ -15,13 +15,13 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | IT00000002 Promote "funding" campaign | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | IT00000001 buy FB targeted ads | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000003 create web-site - information pollution | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000005 SEO optimisation/manipulation ("key words") | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000004 create web-site - information pollution | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | IT00000006 legacy web content | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | IT00000007 hard to remove content and/or campaign/exploit TOS | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | IT00000002 Promote "funding" campaign | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | IT00000001 buy FB targeted ads | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000003 create web-site - information pollution | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000005 SEO optimisation/manipulation ("key words") | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000004 create web-site - information pollution | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | IT00000006 legacy web content | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | IT00000007 hard to remove content and/or campaign/exploit TOS | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00005.md b/generated_pages/incidents/I00005.md index 5165bde..d1f589e 100644 --- a/generated_pages/incidents/I00005.md +++ b/generated_pages/incidents/I00005.md @@ -24,23 +24,23 @@ The report adds that although officially the Russian government asserted its neu | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000011 Fake FB groups + dark content | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000016 cultivate, manipulate, exploit useful idiots | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | IT00000010 Targeted FB paid ads | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000014 RT & Sputnik generate information pollution | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | IT00000023 Memes... anti-immigration; euroskepticism; fear, outrage, conspiracy narratives | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | IT00000013 manipulate social media "online polls"? | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | IT00000024 Backstop personas | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000017 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000018 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0034 LinkedIn](../generated_pages/techniques/T0034.md) | IT00000019 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0035 Pinterest](../generated_pages/techniques/T0035.md) | IT00000020 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0036 WhatsApp](../generated_pages/techniques/T0036.md) | IT00000021 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000022 SEO optimisation/manipulation ("key words") | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000009 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000008 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000015 RT & Sputnik generate information pollution | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | IT00000012 Digital to physical "organize+promote" rallies & events? | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000011 Fake FB groups + dark content | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000016 cultivate, manipulate, exploit useful idiots | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | IT00000010 Targeted FB paid ads | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000014 RT & Sputnik generate information pollution | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000023 Memes... anti-immigration; euroskepticism; fear, outrage, conspiracy narratives | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | IT00000013 manipulate social media "online polls"? | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | IT00000024 Backstop personas | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000017 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000018 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | +| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | IT00000019 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | +| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | IT00000020 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | +| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | IT00000021 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000022 SEO optimisation/manipulation ("key words") | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000009 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000008 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000015 RT & Sputnik generate information pollution | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000012 Digital to physical "organize+promote" rallies & events? | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00006.md b/generated_pages/incidents/I00006.md index e3dfcc9..a8b1d98 100644 --- a/generated_pages/incidents/I00006.md +++ b/generated_pages/incidents/I00006.md @@ -15,12 +15,12 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000029 Fake twitter profiles to amplify | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | IT00000027 Create and use hashtag | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | IT00000026 Fake video/images | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | IT00000030 bait journalists/media/politicians | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | IT00000025 Use SMS/text messages | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | IT00000028 Create and use hashtag | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000029 Fake twitter profiles to amplify | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | IT00000027 Create and use hashtag | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | IT00000026 Fake video/images | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | IT00000030 bait journalists/media/politicians | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | IT00000025 Use SMS/text messages | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | IT00000028 Create and use hashtag | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00007.md b/generated_pages/incidents/I00007.md index 45049d4..1888c89 100644 --- a/generated_pages/incidents/I00007.md +++ b/generated_pages/incidents/I00007.md @@ -15,11 +15,11 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000033 cultivate, manipulate, exploit useful idiots (in the case Paul Manafort) | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000031 RT & Sputnik generate information pollution (report an unreported false story/event) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000035 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000034 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000032 RT & Sputnik generate information pollution (report an unreported false story/event) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000033 cultivate, manipulate, exploit useful idiots (in the case Paul Manafort) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000031 RT & Sputnik generate information pollution (report an unreported false story/event) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000035 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000034 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000032 RT & Sputnik generate information pollution (report an unreported false story/event) | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00009.md b/generated_pages/incidents/I00009.md index f6f99c7..7120e87 100644 --- a/generated_pages/incidents/I00009.md +++ b/generated_pages/incidents/I00009.md @@ -15,11 +15,11 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000039 FB pages | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000037 RT & Sputnik generate information pollution | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | IT00000036 Using "expert" | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | IT00000040 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000038 RT & Sputnik generate information pollution | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000039 FB pages | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000037 RT & Sputnik generate information pollution | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | IT00000036 Using "expert" | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000040 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000038 RT & Sputnik generate information pollution | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00010.md b/generated_pages/incidents/I00010.md index bdae448..e44642b 100644 --- a/generated_pages/incidents/I00010.md +++ b/generated_pages/incidents/I00010.md @@ -15,15 +15,15 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000045 FB pages/groups/profiles | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000044 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories; false flags, crisis actors) | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000048 4Chan/8Chan - trial content | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000046 YouTube; Reddit | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000047 YouTube; Reddit | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | IT00000049 journalist/media baiting | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000043 SEO optimisation/manipulation ("key words") | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000042 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000041 Twitter bots amplify & manipulate | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000045 FB pages/groups/profiles | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000044 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories; false flags, crisis actors) | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000048 4Chan/8Chan - trial content | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000046 YouTube; Reddit | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000047 YouTube; Reddit | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | IT00000049 journalist/media baiting | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000043 SEO optimisation/manipulation ("key words") | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000042 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000041 Twitter bots amplify & manipulate | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00015.md b/generated_pages/incidents/I00015.md index 270a1d0..cc4fd49 100644 --- a/generated_pages/incidents/I00015.md +++ b/generated_pages/incidents/I00015.md @@ -15,10 +15,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | IT00000050 Forge ('release' altered hacked documents) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | IT00000051 hack/leak/manipulate/distort | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | IT00000053 journalist/media baiting | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | IT00000052 Circulate to media via DM, then release publicly | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000050 Forge ('release' altered hacked documents) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000051 hack/leak/manipulate/distort | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | IT00000053 journalist/media baiting | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | IT00000052 Circulate to media via DM, then release publicly | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00017.md b/generated_pages/incidents/I00017.md index 5122e1a..d5855ea 100644 --- a/generated_pages/incidents/I00017.md +++ b/generated_pages/incidents/I00017.md @@ -15,27 +15,27 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000058 Fake FB groups + dark content | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000063 cultivate, manipulate, exploit useful idiots | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | IT00000073 Click-bait (economic actors) fake news sites (ie: Denver Guardian; Macedonian teens) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | IT00000057 Targeted FB paid ads | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000061 RT & Sputnik generate information pollution | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000070 4Chan/8Chan - trial content | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | IT00000072 Memes... anti-immigration; euroskepticism; fear, outrage, conspiracy narratives | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | IT00000054 hack/leak/manipulate/distort | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | IT00000060 manipulate social media "online polls"? | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | IT00000074 Backstop personas | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000064 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000065 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0033 Instagram](../generated_pages/techniques/T0033.md) | IT00000066 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0034 LinkedIn](../generated_pages/techniques/T0034.md) | IT00000067 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0035 Pinterest](../generated_pages/techniques/T0035.md) | IT00000068 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0036 WhatsApp](../generated_pages/techniques/T0036.md) | IT00000069 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000071 SEO optimisation/manipulation ("key words") | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000056 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000055 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000062 RT & Sputnik generate information pollution | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | IT00000059 Digital to physical "organize+promote" rallies & events | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000058 Fake FB groups + dark content | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000063 cultivate, manipulate, exploit useful idiots | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | IT00000073 Click-bait (economic actors) fake news sites (ie: Denver Guardian; Macedonian teens) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | IT00000057 Targeted FB paid ads | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000061 RT & Sputnik generate information pollution | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000070 4Chan/8Chan - trial content | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000072 Memes... anti-immigration; euroskepticism; fear, outrage, conspiracy narratives | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000054 hack/leak/manipulate/distort | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | IT00000060 manipulate social media "online polls"? | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | IT00000074 Backstop personas | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000064 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000065 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0033 Acquire/ recruit Network](../generated_pages/techniques/T0033.md) | IT00000066 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | IT00000067 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | IT00000068 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | IT00000069 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000071 SEO optimisation/manipulation ("key words") | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000056 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000055 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000062 RT & Sputnik generate information pollution | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000059 Digital to physical "organize+promote" rallies & events | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00022.md b/generated_pages/incidents/I00022.md index 4373d1a..89d03d1 100644 --- a/generated_pages/incidents/I00022.md +++ b/generated_pages/incidents/I00022.md @@ -15,10 +15,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000078 Fake FB groups/pages/profiles + dark content | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | IT00000075 hack/leak/manipulate/distort | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000077 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000076 Twitter bots amplify & manipulate | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000078 Fake FB groups/pages/profiles + dark content | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000075 hack/leak/manipulate/distort | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000077 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000076 Twitter bots amplify & manipulate | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00029.md b/generated_pages/incidents/I00029.md index 2e9d250..708892f 100644 --- a/generated_pages/incidents/I00029.md +++ b/generated_pages/incidents/I00029.md @@ -15,17 +15,17 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | IT00000081 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000084 cultivate, manipulate, exploit useful idiots | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000082 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000087 YouTube; Reddit; | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000088 YouTube; Reddit; | -| [T0040 Demand unsurmountable proof](../generated_pages/techniques/T0040.md) | IT00000089 Demand insurmountable proof | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000085 SEO optimisation/manipulation ("key words") | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | IT00000086 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000080 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000079 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000083 RT & Sputnik generate information pollution (synthetic media) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000081 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000084 cultivate, manipulate, exploit useful idiots | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000082 RT & Sputnik generate information pollution (synthetic media) | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000087 YouTube; Reddit; | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000088 YouTube; Reddit; | +| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | IT00000089 Demand insurmountable proof | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000085 SEO optimisation/manipulation ("key words") | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000086 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000080 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000079 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000083 RT & Sputnik generate information pollution (synthetic media) | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00032.md b/generated_pages/incidents/I00032.md index 21afe3d..aaeb18c 100644 --- a/generated_pages/incidents/I00032.md +++ b/generated_pages/incidents/I00032.md @@ -15,21 +15,21 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000092 Fake FB groups/pages/profiles | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000104 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000094 RT & Sputnik generate information pollution | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000102 4Chan/8Chan - trial content | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000096 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000097 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0033 Instagram](../generated_pages/techniques/T0033.md) | IT00000098 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0034 LinkedIn](../generated_pages/techniques/T0034.md) | IT00000099 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0035 Pinterest](../generated_pages/techniques/T0035.md) | IT00000100 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0036 WhatsApp](../generated_pages/techniques/T0036.md) | IT00000101 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000103 SEO optimisation/manipulation ("key words") | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000091 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000090 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000095 RT & Sputnik generate information pollution | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | IT00000093 Digital to physical "organize+promote" rallies & events? | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000092 Fake FB groups/pages/profiles | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000104 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000094 RT & Sputnik generate information pollution | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000102 4Chan/8Chan - trial content | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000096 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000097 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0033 Acquire/ recruit Network](../generated_pages/techniques/T0033.md) | IT00000098 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | IT00000099 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | IT00000100 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | IT00000101 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000103 SEO optimisation/manipulation ("key words") | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000091 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000090 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000095 RT & Sputnik generate information pollution | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000093 Digital to physical "organize+promote" rallies & events? | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00033.md b/generated_pages/incidents/I00033.md index 6273542..3a95437 100644 --- a/generated_pages/incidents/I00033.md +++ b/generated_pages/incidents/I00033.md @@ -15,12 +15,12 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | IT00000110 facilitate state propaganda and defuse crises | -| [T0047 Muzzle social media as a political force](../generated_pages/techniques/T0047.md) | IT00000108 cow online opinion leaders into submission, muzzling social media as a political force | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | IT00000109 cow online opinion leaders into submission, muzzling social media as a political force | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | IT00000105 2,000,000 people (est.) part of state run/sponsored astroturfing | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | IT00000107 domestic social media influence operations focus primarily on “cheerleading” or presenting or furthering a positive narrative about the Chinese state | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | IT00000106 fabricated social media comment | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | IT00000110 facilitate state propaganda and defuse crises | +| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | IT00000108 cow online opinion leaders into submission, muzzling social media as a political force | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | IT00000109 cow online opinion leaders into submission, muzzling social media as a political force | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | IT00000105 2,000,000 people (est.) part of state run/sponsored astroturfing | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | IT00000107 domestic social media influence operations focus primarily on “cheerleading” or presenting or furthering a positive narrative about the Chinese state | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | IT00000106 fabricated social media comment | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00034.md b/generated_pages/incidents/I00034.md index b2776e2..6938ecf 100644 --- a/generated_pages/incidents/I00034.md +++ b/generated_pages/incidents/I00034.md @@ -17,9 +17,9 @@ Unique for taking place outside of the Chinese Internet system, both transgressi | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | IT00000111 Netizens from one of the largest discussion forums in China, known as Diba, coordinated to overcome China’s Great Firewall | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | IT00000112 flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | IT00000113 Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | IT00000111 Netizens from one of the largest discussion forums in China, known as Diba, coordinated to overcome China’s Great Firewall | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | IT00000112 flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | IT00000113 Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00042.md b/generated_pages/incidents/I00042.md index 789f773..f1c8ff9 100644 --- a/generated_pages/incidents/I00042.md +++ b/generated_pages/incidents/I00042.md @@ -15,10 +15,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | IT00000114 “hack” of Qatar’s official news agency | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | IT00000117 memes | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | IT00000116 photoshopped/fake images | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000115 Twitter bots amplify & manipulate | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | IT00000114 “hack” of Qatar’s official news agency | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000117 memes | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | IT00000116 photoshopped/fake images | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000115 Twitter bots amplify & manipulate | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00044.md b/generated_pages/incidents/I00044.md index d3c9585..abebc58 100644 --- a/generated_pages/incidents/I00044.md +++ b/generated_pages/incidents/I00044.md @@ -15,16 +15,16 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | IT00000127 Promote fake “experts” with impressive (and scary) titles | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000126 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000120 RT & Sputnik generate information pollution | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000124 4Chan/8Chan - trial content | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000122 YouTube; Reddit | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000123 YouTube; Reddit | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000125 SEO optimisation/manipulation ("key words") | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000119 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000118 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000121 RT & Sputnik generate information pollution | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | IT00000127 Promote fake “experts” with impressive (and scary) titles | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000126 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000120 RT & Sputnik generate information pollution | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000124 4Chan/8Chan - trial content | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000122 YouTube; Reddit | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000123 YouTube; Reddit | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000125 SEO optimisation/manipulation ("key words") | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000119 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000118 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000121 RT & Sputnik generate information pollution | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00047.md b/generated_pages/incidents/I00047.md index b7ccea8..b2cfb05 100644 --- a/generated_pages/incidents/I00047.md +++ b/generated_pages/incidents/I00047.md @@ -16,12 +16,12 @@ The Russian Federal Security Service (FSB), which is also responsible for border | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | IT00000128 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | IT00000129 Russian FSB security service blamed Ukraine for sparking the clashes, saying their "irrefutable" evidence would "soon be made public | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | IT00000130 (Distort) Kremlin-controlled RT cited Russian Minister of Foreign Affairs Sergei Lavrov suggesting that Ukraine deliberately provoked Russia in hopes of gaining additional support from the United States and Europe. | -| [T0040 Demand unsurmountable proof](../generated_pages/techniques/T0040.md) | IT00000133 Demand insurmountable proof | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000132 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000131 Twitter bots amplify & manipulate | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000128 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000129 Russian FSB security service blamed Ukraine for sparking the clashes, saying their "irrefutable" evidence would "soon be made public | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | IT00000130 (Distort) Kremlin-controlled RT cited Russian Minister of Foreign Affairs Sergei Lavrov suggesting that Ukraine deliberately provoked Russia in hopes of gaining additional support from the United States and Europe. | +| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | IT00000133 Demand insurmountable proof | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000132 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000131 Twitter bots amplify & manipulate | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00049.md b/generated_pages/incidents/I00049.md index 6a6a576..86d7514 100644 --- a/generated_pages/incidents/I00049.md +++ b/generated_pages/incidents/I00049.md @@ -15,16 +15,16 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | IT00000136 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000139 cultivate, manipulate, exploit useful idiots (Roger Waters; Venessa Beeley...) | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000137 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000142 YouTube; Reddit; | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000143 YouTube; Reddit; | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000140 SEO optimisation/manipulation ("key words") | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | IT00000141 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000135 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000134 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000138 RT & Sputnik generate information pollution (synthetic media) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000136 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000139 cultivate, manipulate, exploit useful idiots (Roger Waters; Venessa Beeley...) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000137 RT & Sputnik generate information pollution (synthetic media) | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000142 YouTube; Reddit; | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000143 YouTube; Reddit; | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000140 SEO optimisation/manipulation ("key words") | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000141 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000135 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000134 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000138 RT & Sputnik generate information pollution (synthetic media) | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00050.md b/generated_pages/incidents/I00050.md index 4f701e1..6cfb79b 100644 --- a/generated_pages/incidents/I00050.md +++ b/generated_pages/incidents/I00050.md @@ -18,15 +18,15 @@ Maduro has remained defiant in the face of domestic and international pressure, | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000148 cultivate, manipulate, exploit useful idiots (Roger Waters) | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000146 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000151 YouTube; Reddit; | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000152 YouTube; Reddit; | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000149 SEO optimisation/manipulation ("key words") | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | IT00000150 News circulated/amplifed by tertiary sites (Mint Press News, globalresearch.ca) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000145 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000144 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000147 RT & Sputnik generate information pollution (synthetic media) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000148 cultivate, manipulate, exploit useful idiots (Roger Waters) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000146 RT & Sputnik generate information pollution (synthetic media) | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000151 YouTube; Reddit; | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000152 YouTube; Reddit; | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000149 SEO optimisation/manipulation ("key words") | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000150 News circulated/amplifed by tertiary sites (Mint Press News, globalresearch.ca) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000145 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000144 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000147 RT & Sputnik generate information pollution (synthetic media) | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00051.md b/generated_pages/incidents/I00051.md index 561bdd8..d0b4b75 100644 --- a/generated_pages/incidents/I00051.md +++ b/generated_pages/incidents/I00051.md @@ -16,15 +16,15 @@ The FCO comments on the IfS were issued after a news report said the group had r | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000158 cultivate, manipulate, exploit useful idiots | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000156 RT & Sputnik generate information pollution | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | IT00000153 hack/leak/manipulate/distort | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000159 YouTube; Reddit | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000160 YouTube; Reddit | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000161 SEO optimisation/manipulation ("key words") | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000155 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000154 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000157 RT & Sputnik generate information pollution | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000158 cultivate, manipulate, exploit useful idiots | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000156 RT & Sputnik generate information pollution | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000153 hack/leak/manipulate/distort | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000159 YouTube; Reddit | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000160 YouTube; Reddit | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000161 SEO optimisation/manipulation ("key words") | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000155 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000154 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000157 RT & Sputnik generate information pollution | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00053.md b/generated_pages/incidents/I00053.md index 74d2623..df6e562 100644 --- a/generated_pages/incidents/I00053.md +++ b/generated_pages/incidents/I00053.md @@ -16,13 +16,13 @@ Geopolitically complex issue combines US/China trade; Security concerns/issues r | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | IT00000167 China also plays victim, innocence, plays by rules, misunderstood narrative | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | IT00000168 Chinese ambassador Lu Shaye accused Canada of applying a double standard, and has decried what he sees as “Western egotism and white supremacy” in the treatment of detained Huawei executive Meng Wanzhou.” | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | IT00000163 Distorted, saccharine “news” about the Chinese State and Party | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | IT00000165 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000162 State-run media seeds foreign influence environment | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | IT00000164 Events coordinated and promoted across media platforms | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | IT00000166 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000167 China also plays victim, innocence, plays by rules, misunderstood narrative | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000168 Chinese ambassador Lu Shaye accused Canada of applying a double standard, and has decried what he sees as “Western egotism and white supremacy” in the treatment of detained Huawei executive Meng Wanzhou.” | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | IT00000163 Distorted, saccharine “news” about the Chinese State and Party | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | IT00000165 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000162 State-run media seeds foreign influence environment | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000164 Events coordinated and promoted across media platforms | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000166 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00056.md b/generated_pages/incidents/I00056.md index 39d218c..1814673 100644 --- a/generated_pages/incidents/I00056.md +++ b/generated_pages/incidents/I00056.md @@ -16,14 +16,14 @@ While there is history to Iran’s information/influence operations, starting wi | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | IT00000171 Fake FB groups/pages/profiles + dark content (non-paid advertising) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | IT00000175 Fake news/synthetic web-sites | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | IT00000173 Memes... anti-Isreal/USA/West, conspiracy narratives | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | IT00000174 Memes... anti-Isreal/USA/West, conspiracy narratives | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000172 SEO optimisation/manipulation ("key words") | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000170 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000169 Twitter bots amplify & manipulate | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | IT00000176 legacy web content | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000171 Fake FB groups/pages/profiles + dark content (non-paid advertising) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | IT00000175 Fake news/synthetic web-sites | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000173 Memes... anti-Isreal/USA/West, conspiracy narratives | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | IT00000174 Memes... anti-Isreal/USA/West, conspiracy narratives | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000172 SEO optimisation/manipulation ("key words") | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000170 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000169 Twitter bots amplify & manipulate | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | IT00000176 legacy web content | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00063.md b/generated_pages/incidents/I00063.md index 7312455..bde26d3 100644 --- a/generated_pages/incidents/I00063.md +++ b/generated_pages/incidents/I00063.md @@ -17,16 +17,16 @@ The investigation found corroborating evidence after conducting witness intervie | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | IT00000179 4 D's (dismiss, distort, distract, dismay...Official channels ie: Putin himself; Embassies & Sports Ministry; TASS | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000182 cultivate, manipulate, exploit useful idiots | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000180 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | IT00000185 YouTube; Reddit; | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | IT00000186 YouTube; Reddit; | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000183 SEO optimisation/manipulation ("key words") | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | IT00000184 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | IT00000178 Twitter trolls amplify & manipulate | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | IT00000177 Twitter bots amplify & manipulate | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | IT00000181 RT & Sputnik generate information pollution (synthetic media) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000179 4 D's (dismiss, distort, distract, dismay...Official channels ie: Putin himself; Embassies & Sports Ministry; TASS | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000182 cultivate, manipulate, exploit useful idiots | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000180 RT & Sputnik generate information pollution (synthetic media) | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000185 YouTube; Reddit; | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000186 YouTube; Reddit; | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000183 SEO optimisation/manipulation ("key words") | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000184 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000178 Twitter trolls amplify & manipulate | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000177 Twitter bots amplify & manipulate | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000181 RT & Sputnik generate information pollution (synthetic media) | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/phases/P04.md b/generated_pages/phases/P04.md index 23ec520..20023ce 100644 --- a/generated_pages/phases/P04.md +++ b/generated_pages/phases/P04.md @@ -1,5 +1,5 @@ # Phase P04: Assess -* **Summary:** Evaluate effectiveness of action, for use in future plans +* **Summary:** Evaluate effectiveness of action, for use in future plans DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/phases_index.md b/generated_pages/phases_index.md index 2b27a95..73f20c9 100644 --- a/generated_pages/phases_index.md +++ b/generated_pages/phases_index.md @@ -24,6 +24,6 @@ - +
TA01 Strategic PlanningTA02 Objective PlanningTA13 Conduct Center of Gravity AnalysisTA03 Develop PeopleTA04 Develop NetworksTA05 MicrotargetingTA06 Develop ContentTA07 Channel SelectionTA08 Pump PrimingTA09 ExposureTA10 Drive Offline ActivityTA11 PersistenceTA12 Measure EffectivenessTA01 Plan StrategyTA02 Plan ObjectivesTA03 Target Audience AnalysisTA04 Develop NarrativesTA05 Develop ContentTA06 Establish Social AssetsTA07 Establish LegitimacyTA08 MicrotargetTA09 Select Channels and AffordancesTA10 Conduct Pump PrimingTA11 Deliver ContentTA12 Maximize ExposureTA13 Drive Online HarmsTA14 Drive Offline ActivityTA15 Persist in the Information EnvironmentTA16 Assess Effectiveness
T0001 5Ds (dismiss, distort, distract, dismay, divide)T0006 Develop Narrative ConceptsT0071 Find echo chambersT0007 Create fake Social Media Profiles / Pages / GroupsT0010 Cultivate ignorant agentsT0016 ClickbaitT0019 Generate information pollutionT0029 Manipulate online pollsT0039 Bait legitimate influencersT0047 Muzzle social media as a political forceT0057 Organise remote rallies and eventsT0058 Legacy web contentT0062 Behaviour changesT0001 Determine Target AudiencesT0003 DismissT0010 Map Target Audience Information EnvironmentT0013 Develop New NarrativesT0020 Reuse Existing ContentT0029 Create Inauthentic AccountsT0041 Compromise legitimate accountsT0047 Create ClickbaitT0051 Chat appsT0063 Trial contentT0070 Deliver AdsT0074 Flooding the Information SpaceT0080 HarassT0085 Encourage Attendance at EventsT0090 Conceal PeopleT0095 Measure Performance
T0002 Facilitate State PropagandaT0066 Degrade adversaryT0072 Segment audiencesT0008 Create fake or imposter news sitesT0011 Compromise legitimate accountT0017 Conduct Fundraising CampaignsT0020 Trial contentT0030 Backstop personasT0040 Demand unsurmountable proofT0048 Cow online opinion leadersT0061 Sell merchandisingT0059 Play the long gameT0063 Message reachT0002 Determine Strategic EndsT0004 DistortT0011 Identify Social and Technical VulnerabilitiesT0014 Leverage Existing NarrativesT0021 Develop Text-based ContentT0030 Recruit bad actorsT0042 Create fake expertsT0048 Purchase Targeted AdvertisementsT0052 LivestreamT0064 Bait legitimate influencersT0071 Post ContentT0075 Amplify Existing NarrativeT0081 Censor social media as a political forceT0086 Organize EventsT0091 Conceal Operational ActivityT0096 Measure Effectiveness
T0003 Leverage Existing NarrativesT0067 Plan to discredit credible sources T0009 Create fake expertsT0012 Use concealmentT0018 Purchase advertisementsT0021 MemesT0031 YouTubeT0041 Deny involvementT0049 Flooding T0060 Continue to amplifyT0064 Social media engagementT0005 DistractT0012 Segment AudiencesT0015 Develop Competing NarrativesT0022 Develop Image-based ContentT0031 Cultivate ignorant agentsT0043 Create personasT0049 Create Localized ContentT0053 Social NetworksT0065 Seed Kernel of truthT0072 Comment or Reply on ContentT0076 Cross-PostingT0082 Control Information Environment through Offensive Cyberspace OperationsT0087 Conduct fundraisingT0092 Conceal InfrastructureT0097 Measure Effectiveness Indicators (or KPIs)
T0004 Devise Competing NarrativesT0068 Respond to breaking news event T0006 Dismay T0013 Create fake websitesT0016 Leverage Conspiracy Theory NarrativesT0023 Develop Video-based ContentT0032 Build NetworkT0044 Establish Inauthentic News SitesT0050 Leverage Echo Chambers/Filter BubblesT0054 Media Sharing NetworksT0066 Seed distortionsT0073 Attract Traditional MediaT0077 Incentivize SharingT0083 Suppress OppositionT0088 Physical ViolenceT0093 Exploit TOS/Content Moderation
T0007 Divide T0017 Integrate Target Audience Vulnerabilities into NarrativeT0024 Develop Audio-based ContentT0033 Acquire/ recruit NetworkT0045 Prepare Assets Impersonating Legitimate Entities T0055 Discussion ForumsT0067 Use fake experts T0078 Manipulate Platform AlgorithmT0084 Platform FilteringT0089 Merchandising/ AdvertisingT0094 Play the long game
T0008 Degrade Adversary T0018 Respond to Breaking News Event or Active CrisisT0025 Generate information pollutionT0034 Infiltrate Existing NetworksT0046 Co-opt Trusted Sources T0056 Bookmarking and Content CurationT0068 Use Search Engine Optimization T0079 Direct Users to Alternative Platforms T0022 Conspiracy narrativesT0032 RedditT0042 Kernel of TruthT0050 Cheerleading domestic social media ops
T0069 Respond to active crisisT0009 Facilitate State Propaganda T0019 Demand insurmountable proofT0026 Distort factsT0035 Create Inauthentic Social Media Pages and Groups T0014 Prepare fundraising campaigns T0023 Distort factsT0033 InstagramT0043 Use SMS/ WhatsApp/ Chat appsT0051 Fabricate social media commentT0057 Blogging and Publishing NetworksT0069 Employ Commercial Analytic Firms
T0070 Analyze existing communities T0015 Create hashtags T0024 Create fake videos and imagesT0034 LinkedInT0044 Seed distortionsT0052 Tertiary sites amplify news T0065 Use physical broadcast capabilitiesT0027 Create hashtags and search artifactsT0036 Create inauthentic websites T0058 Consumer Review Networks
T0028 Obtain Private DocumentsT0037 Prepare Physical Broadcast Capabilities T0059 Online polls T0025 Leak altered documentsT0035 PinterestT0045 Use fake expertsT0053 Twitter trolls amplify and manipulate T0038 Develop Owned Media Assets T0060 Formal Diplomatic Channels T0026 Create pseudoscientific or disingenuous researchT0036 WhatsAppT0046 Search Engine OptimizationT0054 Twitter bots amplify T0039 Prepare fundraising campaigns T0061 Traditional Media T0027 Adapt existing narrativesT0037 Facebook T0055 Use hashtag T0040 Leverage Content Farm T0062 Email T0028 Create competing narrativesT0038 Twitter T0056 Dedicated channels disseminate information pollution
P04 AssessEvaluate effectiveness of action, for use in future plansEvaluate effectiveness of action, for use in future plans
diff --git a/generated_pages/tactics/TA01.md b/generated_pages/tactics/TA01.md index 48aca21..40edf64 100644 --- a/generated_pages/tactics/TA01.md +++ b/generated_pages/tactics/TA01.md @@ -1,4 +1,4 @@ -# Tactic TA01: Strategic Planning +# Tactic TA01: Plan Strategy * **Summary:** Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives. @@ -17,10 +17,8 @@ | Techniques | | ---------- | -| [T0001 5Ds (dismiss, distort, distract, dismay, divide)](../generated_pages/techniques/T0001.md) | -| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | -| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | -| [T0004 Devise Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | +| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | diff --git a/generated_pages/tactics/TA02.md b/generated_pages/tactics/TA02.md index 6e28647..7a76243 100644 --- a/generated_pages/tactics/TA02.md +++ b/generated_pages/tactics/TA02.md @@ -1,9 +1,9 @@ -# Tactic TA02: Objective Planning +# Tactic TA02: Plan Objectives -* **Summary:** Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: -- Each desired effect should link directly to one or more objectives -- The effect should be measurable -- The objective statement should not specify the way and means of accomplishment +* **Summary:** Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: +- Each desired effect should link directly to one or more objectives +- The effect should be measurable +- The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task. * **Belongs to phase:** P01 @@ -24,12 +24,13 @@ | Techniques | | ---------- | -| [T0006 Develop Narrative Concepts](../generated_pages/techniques/T0006.md) | -| [T0066 Degrade adversary](../generated_pages/techniques/T0066.md) | -| [T0067 Plan to discredit credible sources](../generated_pages/techniques/T0067.md) | -| [T0068 Respond to breaking news event](../generated_pages/techniques/T0068.md) | -| [T0069 Respond to active crisis](../generated_pages/techniques/T0069.md) | -| [T0070 Analyze existing communities](../generated_pages/techniques/T0070.md) | +| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | +| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0005 Distract](../generated_pages/techniques/T0005.md) | +| [T0006 Dismay](../generated_pages/techniques/T0006.md) | +| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | +| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | diff --git a/generated_pages/tactics/TA03.md b/generated_pages/tactics/TA03.md index 05e1236..faf51df 100644 --- a/generated_pages/tactics/TA03.md +++ b/generated_pages/tactics/TA03.md @@ -1,8 +1,8 @@ -# Tactic TA03: Develop People +# Tactic TA03: Target Audience Analysis -* **Summary:** Develop online and offline users and agents, including automated personas +* **Summary:** Identifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. -* **Belongs to phase:** P02 +* **Belongs to phase:** P01 @@ -18,9 +18,9 @@ | Techniques | | ---------- | -| [T0007 Create fake Social Media Profiles / Pages / Groups](../generated_pages/techniques/T0007.md) | -| [T0008 Create fake or imposter news sites](../generated_pages/techniques/T0008.md) | -| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | diff --git a/generated_pages/tactics/TA04.md b/generated_pages/tactics/TA04.md index a9ca6a5..a7d17d2 100644 --- a/generated_pages/tactics/TA04.md +++ b/generated_pages/tactics/TA04.md @@ -1,6 +1,6 @@ -# Tactic TA04: Develop Networks +# Tactic TA04: Develop Narratives -* **Summary:** Develop online and offline communities and transmission methods and cultivate assets and unwitting agents +* **Summary:** The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a ""whole of society"" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline. * **Belongs to phase:** P02 @@ -17,13 +17,13 @@ | Techniques | | ---------- | -| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | -| [T0011 Compromise legitimate account](../generated_pages/techniques/T0011.md) | -| [T0012 Use concealment](../generated_pages/techniques/T0012.md) | -| [T0013 Create fake websites](../generated_pages/techniques/T0013.md) | -| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | -| [T0015 Create hashtags](../generated_pages/techniques/T0015.md) | -| [T0065 Use physical broadcast capabilities](../generated_pages/techniques/T0065.md) | +| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | +| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | diff --git a/generated_pages/tactics/TA05.md b/generated_pages/tactics/TA05.md index 1d89b5e..8886c41 100644 --- a/generated_pages/tactics/TA05.md +++ b/generated_pages/tactics/TA05.md @@ -1,6 +1,6 @@ -# Tactic TA05: Microtargeting +# Tactic TA05: Develop Content -* **Summary:** Target very specific populations of people +* **Summary:** * **Belongs to phase:** P02 @@ -14,9 +14,15 @@ | Techniques | | ---------- | -| [T0016 Clickbait](../generated_pages/techniques/T0016.md) | -| [T0017 Conduct Fundraising Campaigns](../generated_pages/techniques/T0017.md) | -| [T0018 Purchase advertisements](../generated_pages/techniques/T0018.md) | +| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | +| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | +| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | diff --git a/generated_pages/tactics/TA06.md b/generated_pages/tactics/TA06.md index 0d009ef..a05fbda 100644 --- a/generated_pages/tactics/TA06.md +++ b/generated_pages/tactics/TA06.md @@ -1,6 +1,7 @@ -# Tactic TA06: Develop Content +# Tactic TA06: Establish Social Assets -* **Summary:** Create and acquire content used in incident +* **Summary:** Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. +Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination. * **Belongs to phase:** P02 @@ -16,16 +17,18 @@ | Techniques | | ---------- | -| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | -| [T0020 Trial content](../generated_pages/techniques/T0020.md) | -| [T0021 Memes](../generated_pages/techniques/T0021.md) | -| [T0022 Conspiracy narratives](../generated_pages/techniques/T0022.md) | -| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | -| [T0024 Create fake videos and images](../generated_pages/techniques/T0024.md) | -| [T0025 Leak altered documents](../generated_pages/techniques/T0025.md) | -| [T0026 Create pseudoscientific or disingenuous research](../generated_pages/techniques/T0026.md) | -| [T0027 Adapt existing narratives](../generated_pages/techniques/T0027.md) | -| [T0028 Create competing narratives](../generated_pages/techniques/T0028.md) | +| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | +| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | +| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | +| [T0032 Build Network](../generated_pages/techniques/T0032.md) | +| [T0033 Acquire/ recruit Network](../generated_pages/techniques/T0033.md) | +| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | +| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | +| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | +| [T0037 Prepare Physical Broadcast Capabilities](../generated_pages/techniques/T0037.md) | +| [T0038 Develop Owned Media Assets](../generated_pages/techniques/T0038.md) | +| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | diff --git a/generated_pages/tactics/TA07.md b/generated_pages/tactics/TA07.md index fd8b6df..dc8fb7b 100644 --- a/generated_pages/tactics/TA07.md +++ b/generated_pages/tactics/TA07.md @@ -1,6 +1,6 @@ -# Tactic TA07: Channel Selection +# Tactic TA07: Establish Legitimacy -* **Summary:** Set up specific delivery, amplification and manipulation channels for incident, including channels to attack. Each channel serves as an atomic surface (test bed) location/site for adversary to hide/conceal the work/content that goes into setting up for this channel and/or other specific platforms. Contributes to building out a connected ecosystem where this channel can operate as part of a whole campaign/incident +* **Summary:** * **Belongs to phase:** P02 @@ -14,16 +14,12 @@ | Techniques | | ---------- | -| [T0029 Manipulate online polls](../generated_pages/techniques/T0029.md) | -| [T0030 Backstop personas](../generated_pages/techniques/T0030.md) | -| [T0031 YouTube](../generated_pages/techniques/T0031.md) | -| [T0032 Reddit](../generated_pages/techniques/T0032.md) | -| [T0033 Instagram](../generated_pages/techniques/T0033.md) | -| [T0034 LinkedIn](../generated_pages/techniques/T0034.md) | -| [T0035 Pinterest](../generated_pages/techniques/T0035.md) | -| [T0036 WhatsApp](../generated_pages/techniques/T0036.md) | -| [T0037 Facebook](../generated_pages/techniques/T0037.md) | -| [T0038 Twitter](../generated_pages/techniques/T0038.md) | +| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | +| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | +| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | diff --git a/generated_pages/tactics/TA08.md b/generated_pages/tactics/TA08.md index 6f6479f..d22cdff 100644 --- a/generated_pages/tactics/TA08.md +++ b/generated_pages/tactics/TA08.md @@ -1,8 +1,8 @@ -# Tactic TA08: Pump Priming +# Tactic TA08: Microtarget -* **Summary:** Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. +* **Summary:** Target very specific populations of people -* **Belongs to phase:** P03 +* **Belongs to phase:** P02 @@ -16,14 +16,10 @@ | Techniques | | ---------- | -| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039.md) | -| [T0040 Demand unsurmountable proof](../generated_pages/techniques/T0040.md) | -| [T0041 Deny involvement](../generated_pages/techniques/T0041.md) | -| [T0042 Kernel of Truth](../generated_pages/techniques/T0042.md) | -| [T0043 Use SMS/ WhatsApp/ Chat apps](../generated_pages/techniques/T0043.md) | -| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | -| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | -| [T0046 Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | +| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | diff --git a/generated_pages/tactics/TA09.md b/generated_pages/tactics/TA09.md index 5ef90e5..a01514c 100644 --- a/generated_pages/tactics/TA09.md +++ b/generated_pages/tactics/TA09.md @@ -1,8 +1,8 @@ -# Tactic TA09: Exposure +# Tactic TA09: Select Channels and Affordances -* **Summary:** Release content to general public or push to larger population +* **Summary:** Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation’s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content. -* **Belongs to phase:** P03 +* **Belongs to phase:** P02 @@ -16,16 +16,18 @@ | Techniques | | ---------- | -| [T0047 Muzzle social media as a political force](../generated_pages/techniques/T0047.md) | -| [T0048 Cow online opinion leaders](../generated_pages/techniques/T0048.md) | -| [T0049 Flooding](../generated_pages/techniques/T0049.md) | -| [T0050 Cheerleading domestic social media ops](../generated_pages/techniques/T0050.md) | -| [T0051 Fabricate social media comment](../generated_pages/techniques/T0051.md) | -| [T0052 Tertiary sites amplify news](../generated_pages/techniques/T0052.md) | -| [T0053 Twitter trolls amplify and manipulate](../generated_pages/techniques/T0053.md) | -| [T0054 Twitter bots amplify](../generated_pages/techniques/T0054.md) | -| [T0055 Use hashtag](../generated_pages/techniques/T0055.md) | -| [T0056 Dedicated channels disseminate information pollution](../generated_pages/techniques/T0056.md) | +| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | +| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | +| [T0059 Online polls](../generated_pages/techniques/T0059.md) | +| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0062 Email](../generated_pages/techniques/T0062.md) | @@ -41,7 +43,7 @@ | [C00126 Social media amber alert](../generated_pages/counters/C00126.md) | D03 | | [C00128 Create friction by marking content with ridicule or other "decelerants"](../generated_pages/counters/C00128.md) | D03 | | [C00147 Make amplification of social media posts expire (e.g. can't like/ retweet after n days)](../generated_pages/counters/C00147.md) | D03 | -| [C00200 Influencer disavows misinfo](../generated_pages/counters/C00200.md) | D03 | +| [C00200 Respected figure (influencer) disavows misinfo](../generated_pages/counters/C00200.md) | D03 | | [C00211 Use humorous counter-narratives](../generated_pages/counters/C00211.md) | D03 | diff --git a/generated_pages/tactics/TA10.md b/generated_pages/tactics/TA10.md index d686427..2e36426 100644 --- a/generated_pages/tactics/TA10.md +++ b/generated_pages/tactics/TA10.md @@ -1,6 +1,6 @@ -# Tactic TA10: Drive Offline Activity +# Tactic TA10: Conduct Pump Priming -* **Summary:** Move incident into offline world +* **Summary:** Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. * **Belongs to phase:** P03 @@ -14,8 +14,13 @@ | Techniques | | ---------- | -| [T0057 Organise remote rallies and events](../generated_pages/techniques/T0057.md) | -| [T0061 Sell merchandising](../generated_pages/techniques/T0061.md) | +| [T0063 Trial content](../generated_pages/techniques/T0063.md) | +| [T0064 Bait legitimate influencers](../generated_pages/techniques/T0064.md) | +| [T0065 Seed Kernel of truth](../generated_pages/techniques/T0065.md) | +| [T0066 Seed distortions](../generated_pages/techniques/T0066.md) | +| [T0067 Use fake experts](../generated_pages/techniques/T0067.md) | +| [T0068 Use Search Engine Optimization](../generated_pages/techniques/T0068.md) | +| [T0069 Employ Commercial Analytic Firms](../generated_pages/techniques/T0069.md) | diff --git a/generated_pages/tactics/TA11.md b/generated_pages/tactics/TA11.md index a03d310..2cb430c 100644 --- a/generated_pages/tactics/TA11.md +++ b/generated_pages/tactics/TA11.md @@ -1,6 +1,6 @@ -# Tactic TA11: Persistence +# Tactic TA11: Deliver Content -* **Summary:** Keep incident 'alive', beyond the incident creators' efforts +* **Summary:** Release content to general public or larger population * **Belongs to phase:** P03 @@ -19,9 +19,10 @@ | Techniques | | ---------- | -| [T0058 Legacy web content](../generated_pages/techniques/T0058.md) | -| [T0059 Play the long game](../generated_pages/techniques/T0059.md) | -| [T0060 Continue to amplify](../generated_pages/techniques/T0060.md) | +| [T0070 Deliver Ads](../generated_pages/techniques/T0070.md) | +| [T0071 Post Content](../generated_pages/techniques/T0071.md) | +| [T0072 Comment or Reply on Content](../generated_pages/techniques/T0072.md) | +| [T0073 Attract Traditional Media](../generated_pages/techniques/T0073.md) | diff --git a/generated_pages/tactics/TA12.md b/generated_pages/tactics/TA12.md index c6bd11c..eb554b4 100644 --- a/generated_pages/tactics/TA12.md +++ b/generated_pages/tactics/TA12.md @@ -1,8 +1,8 @@ -# Tactic TA12: Measure Effectiveness +# Tactic TA12: Maximize Exposure -* **Summary:** Measure effectiveness of incident, for use in planning future events +* **Summary:** Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting. -* **Belongs to phase:** P04 +* **Belongs to phase:** P03 @@ -17,9 +17,12 @@ | Techniques | | ---------- | -| [T0062 Behaviour changes](../generated_pages/techniques/T0062.md) | -| [T0063 Message reach](../generated_pages/techniques/T0063.md) | -| [T0064 Social media engagement](../generated_pages/techniques/T0064.md) | +| [T0074 Flooding the Information Space](../generated_pages/techniques/T0074.md) | +| [T0075 Amplify Existing Narrative](../generated_pages/techniques/T0075.md) | +| [T0076 Cross-Posting](../generated_pages/techniques/T0076.md) | +| [T0077 Incentivize Sharing](../generated_pages/techniques/T0077.md) | +| [T0078 Manipulate Platform Algorithm](../generated_pages/techniques/T0078.md) | +| [T0079 Direct Users to Alternative Platforms](../generated_pages/techniques/T0079.md) | diff --git a/generated_pages/tactics/TA13.md b/generated_pages/tactics/TA13.md index 2623b32..3f048b2 100644 --- a/generated_pages/tactics/TA13.md +++ b/generated_pages/tactics/TA13.md @@ -1,8 +1,8 @@ -# Tactic TA13: Conduct Center of Gravity Analysis +# Tactic TA13: Drive Online Harms -* **Summary:** Recon/research to identify "the source of power that provides moral or physical strength, freedom of action, or will to act." Thus, the center of gravity is usually seen as the "source of strength". Includes demographic and network analysis of communities +* **Summary:** Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. -* **Belongs to phase:** P01 +* **Belongs to phase:** P03 @@ -13,8 +13,11 @@ | Techniques | | ---------- | -| [T0071 Find echo chambers](../generated_pages/techniques/T0071.md) | -| [T0072 Segment audiences](../generated_pages/techniques/T0072.md) | +| [T0080 Harass](../generated_pages/techniques/T0080.md) | +| [T0081 Censor social media as a political force](../generated_pages/techniques/T0081.md) | +| [T0082 Control Information Environment through Offensive Cyberspace Operations](../generated_pages/techniques/T0082.md) | +| [T0083 Suppress Opposition](../generated_pages/techniques/T0083.md) | +| [T0084 Platform Filtering](../generated_pages/techniques/T0084.md) | diff --git a/generated_pages/tactics/TA14.md b/generated_pages/tactics/TA14.md new file mode 100644 index 0000000..8bb9d3b --- /dev/null +++ b/generated_pages/tactics/TA14.md @@ -0,0 +1,28 @@ +# Tactic TA14: Drive Offline Activity + +* **Summary:** Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. + +* **Belongs to phase:** P03 + + + +| Tasks | +| ----- | + + + +| Techniques | +| ---------- | +| [T0085 Encourage Attendance at Events](../generated_pages/techniques/T0085.md) | +| [T0086 Organize Events](../generated_pages/techniques/T0086.md) | +| [T0087 Conduct fundraising](../generated_pages/techniques/T0087.md) | +| [T0088 Physical Violence](../generated_pages/techniques/T0088.md) | +| [T0089 Merchandising/ Advertising](../generated_pages/techniques/T0089.md) | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tactics/TA15.md b/generated_pages/tactics/TA15.md new file mode 100644 index 0000000..a5a4d39 --- /dev/null +++ b/generated_pages/tactics/TA15.md @@ -0,0 +1,28 @@ +# Tactic TA15: Persist in the Information Environment + +* **Summary:** Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign. + +* **Belongs to phase:** P03 + + + +| Tasks | +| ----- | + + + +| Techniques | +| ---------- | +| [T0090 Conceal People](../generated_pages/techniques/T0090.md) | +| [T0091 Conceal Operational Activity](../generated_pages/techniques/T0091.md) | +| [T0092 Conceal Infrastructure](../generated_pages/techniques/T0092.md) | +| [T0093 Exploit TOS/Content Moderation](../generated_pages/techniques/T0093.md) | +| [T0094 Play the long game](../generated_pages/techniques/T0094.md) | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tactics/TA16.md b/generated_pages/tactics/TA16.md new file mode 100644 index 0000000..6c2d565 --- /dev/null +++ b/generated_pages/tactics/TA16.md @@ -0,0 +1,26 @@ +# Tactic TA16: Assess Effectiveness + +* **Summary:** Assess effectiveness of action, for use in future plans + +* **Belongs to phase:** P04 + + + +| Tasks | +| ----- | + + + +| Techniques | +| ---------- | +| [T0095 Measure Performance](../generated_pages/techniques/T0095.md) | +| [T0096 Measure Effectiveness](../generated_pages/techniques/T0096.md) | +| [T0097 Measure Effectiveness Indicators (or KPIs)](../generated_pages/techniques/T0097.md) | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tactics_by_responsetype_table.md b/generated_pages/tactics_by_responsetype_table.md index 1bd8331..6828a06 100644 --- a/generated_pages/tactics_by_responsetype_table.md +++ b/generated_pages/tactics_by_responsetype_table.md @@ -10,7 +10,7 @@ D06 D07 TOTALS -TA01 Strategic Planning +TA01 Plan Strategy 7 11 6 @@ -20,7 +20,7 @@ 28 -TA02 Objective Planning +TA02 Plan Objectives 3 9 1 @@ -30,7 +30,7 @@ 15 -TA03 Develop People +TA03 Target Audience Analysis 7 4 3 @@ -40,7 +40,7 @@ 17 -TA04 Develop Networks +TA04 Develop Narratives 3 3 3 @@ -50,7 +50,7 @@ 10 -TA05 Microtargeting +TA05 Develop Content 1 2 1 @@ -60,7 +60,7 @@ 5 -TA06 Develop Content +TA06 Establish Social Assets 8 8 6 @@ -70,7 +70,7 @@ 23 -TA07 Channel Selection +TA07 Establish Legitimacy 4 1 1 @@ -80,7 +80,7 @@ 8 -TA08 Pump Priming +TA08 Microtarget 6 3 3 @@ -90,7 +90,7 @@ 15 -TA09 Exposure +TA09 Select Channels and Affordances 3 9 0 @@ -100,7 +100,7 @@ 12 -TA11 Persistence +TA11 Deliver Content 1 2 1 @@ -110,7 +110,7 @@ 4 -TA12 Measure Effectiveness +TA12 Maximize Exposure 0 1 2 diff --git a/generated_pages/tactics_index.md b/generated_pages/tactics_index.md index b6afd0a..ffa2089 100644 --- a/generated_pages/tactics_index.md +++ b/generated_pages/tactics_index.md @@ -9,84 +9,103 @@ TA01 -Strategic Planning +Plan Strategy Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives. P01 TA02 -Objective Planning -Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: -- Each desired effect should link directly to one or more objectives -- The effect should be measurable -- The objective statement should not specify the way and means of accomplishment +Plan Objectives +Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: +- Each desired effect should link directly to one or more objectives +- The effect should be measurable +- The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task. P01 -TA13 -Conduct Center of Gravity Analysis -Recon/research to identify "the source of power that provides moral or physical strength, freedom of action, or will to act." Thus, the center of gravity is usually seen as the "source of strength". Includes demographic and network analysis of communities +TA03 +Target Audience Analysis +Identifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. P01 -TA03 -Develop People -Develop online and offline users and agents, including automated personas -P02 - - TA04 -Develop Networks -Develop online and offline communities and transmission methods and cultivate assets and unwitting agents +Develop Narratives +The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a ""whole of society"" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline. P02 TA05 -Microtargeting -Target very specific populations of people +Develop Content + P02 TA06 -Develop Content -Create and acquire content used in incident +Establish Social Assets +Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. +Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination. P02 TA07 -Channel Selection -Set up specific delivery, amplification and manipulation channels for incident, including channels to attack. Each channel serves as an atomic surface (test bed) location/site for adversary to hide/conceal the work/content that goes into setting up for this channel and/or other specific platforms. Contributes to building out a connected ecosystem where this channel can operate as part of a whole campaign/incident +Establish Legitimacy + P02 TA08 -Pump Priming -Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. -P03 +Microtarget +Target very specific populations of people +P02 TA09 -Exposure -Release content to general public or push to larger population -P03 +Select Channels and Affordances +Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation’s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content. +P02 TA10 -Drive Offline Activity -Move incident into offline world +Conduct Pump Priming +Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. P03 TA11 -Persistence -Keep incident 'alive', beyond the incident creators' efforts +Deliver Content +Release content to general public or larger population P03 TA12 -Measure Effectiveness -Measure effectiveness of incident, for use in planning future events +Maximize Exposure +Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting. +P03 + + +TA13 +Drive Online Harms +Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. +P03 + + +TA14 +Drive Offline Activity +Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. +P03 + + +TA15 +Persist in the Information Environment +Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign. +P03 + + +TA16 +Assess Effectiveness +Assess effectiveness of action, for use in future plans P04 diff --git a/generated_pages/techniques/T0001.md b/generated_pages/techniques/T0001.md index f99738b..4ba41ca 100644 --- a/generated_pages/techniques/T0001.md +++ b/generated_pages/techniques/T0001.md @@ -1,6 +1,6 @@ -# Technique T0001: 5Ds (dismiss, distort, distract, dismay, divide) +# Technique T0001: Determine Target Audiences -* **Summary**: Nimmo's "4Ds of propaganda": dismiss, distort, distract, dismay (MisinfosecWG added divide in 2019). Misinformation promotes an agenda by advancing narratives supportive of that agenda. This is most effective when the advanced narrative pre-dates the revelation of the specific misinformation content. This is often not possible. +* **Summary**: * **Belongs to tactic stage**: TA01 diff --git a/generated_pages/techniques/T0002.md b/generated_pages/techniques/T0002.md index 762797e..61e5c5e 100644 --- a/generated_pages/techniques/T0002.md +++ b/generated_pages/techniques/T0002.md @@ -1,6 +1,6 @@ -# Technique T0002: Facilitate State Propaganda +# Technique T0002: Determine Strategic Ends -* **Summary**: Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda. +* **Summary**: * **Belongs to tactic stage**: TA01 diff --git a/generated_pages/techniques/T0003.md b/generated_pages/techniques/T0003.md index cb35ae5..9b059a6 100644 --- a/generated_pages/techniques/T0003.md +++ b/generated_pages/techniques/T0003.md @@ -1,8 +1,8 @@ -# Technique T0003: Leverage Existing Narratives +# Technique T0003: Dismiss -* **Summary**: Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. +* **Summary**: Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased. -* **Belongs to tactic stage**: TA01 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0004.md b/generated_pages/techniques/T0004.md index 803fa0d..d447340 100644 --- a/generated_pages/techniques/T0004.md +++ b/generated_pages/techniques/T0004.md @@ -1,12 +1,8 @@ -# Technique T0004: Devise Competing Narratives +# Technique T0004: Distort -* **Summary**: Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. +* **Summary**: Twist the narrative. Take information, or artifacts like images, and change the framing around them. -Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. - -These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. - -* **Belongs to tactic stage**: TA01 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0005.md b/generated_pages/techniques/T0005.md index 9246423..243d3d1 100644 --- a/generated_pages/techniques/T0005.md +++ b/generated_pages/techniques/T0005.md @@ -1,6 +1,6 @@ -# Technique T0005: Center of Gravity Analysis +# Technique T0005: Distract -* **Summary**: Recon/research to identify "the source of power that provides moral or physical strength, freedom of action, or will to act." Thus, the center of gravity is usually seen as the "source of strength". Includes demographic and network analysis of communities +* **Summary**: Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they’ve accused you of (e.g. police brutality). * **Belongs to tactic stage**: TA02 diff --git a/generated_pages/techniques/T0006.md b/generated_pages/techniques/T0006.md index 8fa67b2..615c624 100644 --- a/generated_pages/techniques/T0006.md +++ b/generated_pages/techniques/T0006.md @@ -1,6 +1,6 @@ -# Technique T0006: Develop Narrative Concepts +# Technique T0006: Dismay -* **Summary**: The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a "whole of society" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion consitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline. +* **Summary**: Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story. * **Belongs to tactic stage**: TA02 diff --git a/generated_pages/techniques/T0007.md b/generated_pages/techniques/T0007.md index 664e620..871a9b3 100644 --- a/generated_pages/techniques/T0007.md +++ b/generated_pages/techniques/T0007.md @@ -1,11 +1,8 @@ -# Technique T0007: Create fake Social Media Profiles / Pages / Groups +# Technique T0007: Divide -* **Summary**: Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. +* **Summary**: Create conflict between subgroups, to widen divisions in a community -Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. - - -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0008.md b/generated_pages/techniques/T0008.md index 46e41b3..f0e3618 100644 --- a/generated_pages/techniques/T0008.md +++ b/generated_pages/techniques/T0008.md @@ -1,8 +1,8 @@ -# Technique T0008: Create fake or imposter news sites +# Technique T0008: Degrade Adversary -* **Summary**: Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. +* **Summary**: Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation. -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0009.md b/generated_pages/techniques/T0009.md index 6b1d671..bd6e8a3 100644 --- a/generated_pages/techniques/T0009.md +++ b/generated_pages/techniques/T0009.md @@ -1,8 +1,8 @@ -# Technique T0009: Create fake experts +# Technique T0009: Facilitate State Propaganda -* **Summary**: Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. +* **Summary**: Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda. -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0010.md b/generated_pages/techniques/T0010.md index bfeb862..4510550 100644 --- a/generated_pages/techniques/T0010.md +++ b/generated_pages/techniques/T0010.md @@ -1,8 +1,9 @@ -# Technique T0010: Cultivate ignorant agents +# Technique T0010: Map Target Audience Information Environment -* **Summary**: Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". +* **Summary**: Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. +Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA03 | Incident | Descriptions given for this incident | @@ -47,7 +48,7 @@ | [C00188 Newsroom/Journalist training to counter influence moves](../generated_pages/counters/C00188.md) | D03 | | [C00190 open engagement with civil society](../generated_pages/counters/C00190.md) | D03 | | [C00195 Redirect searches away from disinformation or extremist content ](../generated_pages/counters/C00195.md) | D02 | -| [C00200 Influencer disavows misinfo](../generated_pages/counters/C00200.md) | D03 | +| [C00200 Respected figure (influencer) disavows misinfo](../generated_pages/counters/C00200.md) | D03 | | [C00203 Stop offering press credentials to propaganda outlets](../generated_pages/counters/C00203.md) | D03 | | [C00212 build public resilience by making civil society more vibrant](../generated_pages/counters/C00212.md) | D03 | diff --git a/generated_pages/techniques/T0011.md b/generated_pages/techniques/T0011.md index 38e997d..ecc12ba 100644 --- a/generated_pages/techniques/T0011.md +++ b/generated_pages/techniques/T0011.md @@ -1,8 +1,9 @@ -# Technique T0011: Compromise legitimate account +# Technique T0011: Identify Social and Technical Vulnerabilities -* **Summary**: Hack or take over legimate accounts to distribute misinformation or damaging content. +* **Summary**: Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. +Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA03 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0012.md b/generated_pages/techniques/T0012.md index a99f5e1..69669bb 100644 --- a/generated_pages/techniques/T0012.md +++ b/generated_pages/techniques/T0012.md @@ -1,8 +1,8 @@ -# Technique T0012: Use concealment +# Technique T0012: Segment Audiences -* **Summary**: Use anonymous social media profiles. Examples include page or group administrators, masked "whois" website directory data, no bylines connected to news article, no masthead connect to news websites. +* **Summary**: Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA03 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0013.md b/generated_pages/techniques/T0013.md index abec91d..ee3cf09 100644 --- a/generated_pages/techniques/T0013.md +++ b/generated_pages/techniques/T0013.md @@ -1,6 +1,6 @@ -# Technique T0013: Create fake websites +# Technique T0013: Develop New Narratives -* **Summary**: Create media assets to support fake organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. +* **Summary**: * **Belongs to tactic stage**: TA04 diff --git a/generated_pages/techniques/T0014.md b/generated_pages/techniques/T0014.md index 8e7fad3..fee9c6d 100644 --- a/generated_pages/techniques/T0014.md +++ b/generated_pages/techniques/T0014.md @@ -1,6 +1,6 @@ -# Technique T0014: Prepare fundraising campaigns +# Technique T0014: Leverage Existing Narratives -* **Summary**: Generate revenue through new or existing funding campaigns. e.g. Gather data, advance credible persona via Gofundme; Patreon; or via fake website connecting via PayPal or Stripe. +* **Summary**: Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. * **Belongs to tactic stage**: TA04 diff --git a/generated_pages/techniques/T0015.md b/generated_pages/techniques/T0015.md index 53aa381..8901a82 100644 --- a/generated_pages/techniques/T0015.md +++ b/generated_pages/techniques/T0015.md @@ -1,6 +1,6 @@ -# Technique T0015: Create hashtags +# Technique T0015: Develop Competing Narratives -* **Summary**: Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). +* **Summary**: Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. * **Belongs to tactic stage**: TA04 diff --git a/generated_pages/techniques/T0016.md b/generated_pages/techniques/T0016.md index 14e7707..0e46cf0 100644 --- a/generated_pages/techniques/T0016.md +++ b/generated_pages/techniques/T0016.md @@ -1,8 +1,8 @@ -# Technique T0016: Clickbait +# Technique T0016: Leverage Conspiracy Theory Narratives -* **Summary**: Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset +* **Summary**: "Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA04 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0017.md b/generated_pages/techniques/T0017.md index 610a3ec..0729f89 100644 --- a/generated_pages/techniques/T0017.md +++ b/generated_pages/techniques/T0017.md @@ -1,8 +1,8 @@ -# Technique T0017: Conduct Fundraising Campaigns +# Technique T0017: Integrate Target Audience Vulnerabilities into Narrative -* **Summary**: Drive traffic/engagement to funding campaign sites; helps provide measurable metrics to assess conversion rates +* **Summary**: An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment. -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA04 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0018.md b/generated_pages/techniques/T0018.md index 65d6d63..bd20be2 100644 --- a/generated_pages/techniques/T0018.md +++ b/generated_pages/techniques/T0018.md @@ -1,8 +1,8 @@ -# Technique T0018: Purchase advertisements +# Technique T0018: Respond to Breaking News Event or Active Crisis -* **Summary**: Create or fund advertisements targeted at specific populations +* **Summary**: Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA04 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0019.md b/generated_pages/techniques/T0019.md index 0877dc9..95c1e94 100644 --- a/generated_pages/techniques/T0019.md +++ b/generated_pages/techniques/T0019.md @@ -1,8 +1,8 @@ -# Technique T0019: Generate information pollution +# Technique T0019: Demand insurmountable proof -* **Summary**: Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. +* **Summary**: Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA04 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0020.md b/generated_pages/techniques/T0020.md index 075b4cb..258899c 100644 --- a/generated_pages/techniques/T0020.md +++ b/generated_pages/techniques/T0020.md @@ -1,8 +1,8 @@ -# Technique T0020: Trial content +# Technique T0020: Reuse Existing Content -* **Summary**: Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates +* **Summary**: When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0021.md b/generated_pages/techniques/T0021.md index 5677836..4734e88 100644 --- a/generated_pages/techniques/T0021.md +++ b/generated_pages/techniques/T0021.md @@ -1,8 +1,8 @@ -# Technique T0021: Memes +# Technique T0021: Develop Text-based Content -* **Summary**: Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns. +* **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0022.md b/generated_pages/techniques/T0022.md index a30900b..5ce07c3 100644 --- a/generated_pages/techniques/T0022.md +++ b/generated_pages/techniques/T0022.md @@ -1,8 +1,8 @@ -# Technique T0022: Conspiracy narratives +# Technique T0022: Develop Image-based Content -* **Summary**: "Conspiracy narratives appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the ""firehose of falsehoods"" model. +* **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | @@ -50,7 +50,7 @@ | [C00188 Newsroom/Journalist training to counter influence moves](../generated_pages/counters/C00188.md) | D03 | | [C00190 open engagement with civil society](../generated_pages/counters/C00190.md) | D03 | | [C00195 Redirect searches away from disinformation or extremist content ](../generated_pages/counters/C00195.md) | D02 | -| [C00200 Influencer disavows misinfo](../generated_pages/counters/C00200.md) | D03 | +| [C00200 Respected figure (influencer) disavows misinfo](../generated_pages/counters/C00200.md) | D03 | | [C00203 Stop offering press credentials to propaganda outlets](../generated_pages/counters/C00203.md) | D03 | | [C00205 strong dialogue between the federal government and private sector to encourage better reporting](../generated_pages/counters/C00205.md) | D03 | | [C00211 Use humorous counter-narratives](../generated_pages/counters/C00211.md) | D03 | diff --git a/generated_pages/techniques/T0023.md b/generated_pages/techniques/T0023.md index 33111d0..882c3a4 100644 --- a/generated_pages/techniques/T0023.md +++ b/generated_pages/techniques/T0023.md @@ -1,8 +1,8 @@ -# Technique T0023: Distort facts +# Technique T0023: Develop Video-based Content -* **Summary**: Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content +* **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0024.md b/generated_pages/techniques/T0024.md index 2c43937..468cfc2 100644 --- a/generated_pages/techniques/T0024.md +++ b/generated_pages/techniques/T0024.md @@ -1,8 +1,8 @@ -# Technique T0024: Create fake videos and images +# Technique T0024: Develop Audio-based Content -* **Summary**: Create fake videos and/or images by manipulating existing content or generating new content (e.g. deepfakes). +* **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0025.md b/generated_pages/techniques/T0025.md index 7e48fcf..ea44aa9 100644 --- a/generated_pages/techniques/T0025.md +++ b/generated_pages/techniques/T0025.md @@ -1,8 +1,8 @@ -# Technique T0025: Leak altered documents +# Technique T0025: Generate information pollution -* **Summary**: Obtain documents (eg by theft or leak), then alter and release, possibly among factual documents/sources. +* **Summary**: Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | @@ -34,7 +34,7 @@ | [C00176 Improve Coordination amongst stakeholders: public and private](../generated_pages/counters/C00176.md) | D07 | | [C00190 open engagement with civil society](../generated_pages/counters/C00190.md) | D03 | | [C00195 Redirect searches away from disinformation or extremist content ](../generated_pages/counters/C00195.md) | D02 | -| [C00200 Influencer disavows misinfo](../generated_pages/counters/C00200.md) | D03 | +| [C00200 Respected figure (influencer) disavows misinfo](../generated_pages/counters/C00200.md) | D03 | | [C00202 Set data 'honeytraps'](../generated_pages/counters/C00202.md) | D02 | | [C00205 strong dialogue between the federal government and private sector to encourage better reporting](../generated_pages/counters/C00205.md) | D03 | | [C00211 Use humorous counter-narratives](../generated_pages/counters/C00211.md) | D03 | diff --git a/generated_pages/techniques/T0026.md b/generated_pages/techniques/T0026.md index 964bf87..edb6549 100644 --- a/generated_pages/techniques/T0026.md +++ b/generated_pages/techniques/T0026.md @@ -1,8 +1,8 @@ -# Technique T0026: Create pseudoscientific or disingenuous research +# Technique T0026: Distort facts -* **Summary**: Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx +* **Summary**: Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0027.md b/generated_pages/techniques/T0027.md index 8d386fb..27eabc2 100644 --- a/generated_pages/techniques/T0027.md +++ b/generated_pages/techniques/T0027.md @@ -1,8 +1,8 @@ -# Technique T0027: Adapt existing narratives +# Technique T0027: Create hashtags and search artifacts -* **Summary**: Adapting existing narratives to current operational goals is the tactical sweet-spot for an effective misinformation campaign. Leveraging existing narratives is not only more effective, it requires substantially less resourcing, as the promotion of new master narratives operates on a much larger scale, both time and scope. Fluid, dynamic & often interchangeable key master narratives can be ("The morally corrupt West") adapted to divisive (LGBT propaganda) or to distort (individuals working as CIA operatives). For Western audiences, different but equally powerful framings are available, such as "USA has a fraught history in race relations, especially in criminal justice areas." +* **Summary**: Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | @@ -48,7 +48,7 @@ | [C00188 Newsroom/Journalist training to counter influence moves](../generated_pages/counters/C00188.md) | D03 | | [C00190 open engagement with civil society](../generated_pages/counters/C00190.md) | D03 | | [C00195 Redirect searches away from disinformation or extremist content ](../generated_pages/counters/C00195.md) | D02 | -| [C00200 Influencer disavows misinfo](../generated_pages/counters/C00200.md) | D03 | +| [C00200 Respected figure (influencer) disavows misinfo](../generated_pages/counters/C00200.md) | D03 | | [C00203 Stop offering press credentials to propaganda outlets](../generated_pages/counters/C00203.md) | D03 | | [C00205 strong dialogue between the federal government and private sector to encourage better reporting](../generated_pages/counters/C00205.md) | D03 | | [C00211 Use humorous counter-narratives](../generated_pages/counters/C00211.md) | D03 | diff --git a/generated_pages/techniques/T0028.md b/generated_pages/techniques/T0028.md index 560b9ef..a553cbe 100644 --- a/generated_pages/techniques/T0028.md +++ b/generated_pages/techniques/T0028.md @@ -1,12 +1,8 @@ -# Technique T0028: Create competing narratives +# Technique T0028: Obtain Private Documents -* **Summary**: Misinformation promotes an agenda by advancing narratives supportive of that agenda. This is most effective when the advanced narrative pre-dates the revelation of the specific misinformation content. But this is often not possible. +* **Summary**: -Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. - -These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the *firehose of misinformation* approach. - -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0029.md b/generated_pages/techniques/T0029.md index 71a5621..195d5e8 100644 --- a/generated_pages/techniques/T0029.md +++ b/generated_pages/techniques/T0029.md @@ -1,8 +1,8 @@ -# Technique T0029: Manipulate online polls +# Technique T0029: Create Inauthentic Accounts -* **Summary**: Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well +* **Summary**: -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0030.md b/generated_pages/techniques/T0030.md index 0281e11..7d91678 100644 --- a/generated_pages/techniques/T0030.md +++ b/generated_pages/techniques/T0030.md @@ -1,8 +1,8 @@ -# Technique T0030: Backstop personas +# Technique T0030: Recruit bad actors -* **Summary**: Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believability +* **Summary**: -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0031.md b/generated_pages/techniques/T0031.md index f7a7065..0e4cbfc 100644 --- a/generated_pages/techniques/T0031.md +++ b/generated_pages/techniques/T0031.md @@ -1,8 +1,8 @@ -# Technique T0031: YouTube +# Technique T0031: Cultivate ignorant agents -* **Summary**: Use YouTube as a narrative dissemination channel +* **Summary**: Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0032.md b/generated_pages/techniques/T0032.md index 790e0b7..6b0695b 100644 --- a/generated_pages/techniques/T0032.md +++ b/generated_pages/techniques/T0032.md @@ -1,8 +1,8 @@ -# Technique T0032: Reddit +# Technique T0032: Build Network -* **Summary**: Use Reddit as a narrative dissemination channel +* **Summary**: -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0033.md b/generated_pages/techniques/T0033.md index 8ba5a57..80863b3 100644 --- a/generated_pages/techniques/T0033.md +++ b/generated_pages/techniques/T0033.md @@ -1,8 +1,8 @@ -# Technique T0033: Instagram +# Technique T0033: Acquire/ recruit Network -* **Summary**: Use Instagram as a narrative dissemination channel +* **Summary**: -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0034.md b/generated_pages/techniques/T0034.md index 9078791..48de518 100644 --- a/generated_pages/techniques/T0034.md +++ b/generated_pages/techniques/T0034.md @@ -1,8 +1,8 @@ -# Technique T0034: LinkedIn +# Technique T0034: Infiltrate Existing Networks -* **Summary**: Use LinkedIn as a narrative dissemination channel +* **Summary**: -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0035.md b/generated_pages/techniques/T0035.md index a07e49b..b10f63c 100644 --- a/generated_pages/techniques/T0035.md +++ b/generated_pages/techniques/T0035.md @@ -1,8 +1,8 @@ -# Technique T0035: Pinterest +# Technique T0035: Create Inauthentic Social Media Pages and Groups -* **Summary**: Use Pinterest as a narrative dissemination channel +* **Summary**: Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0036.md b/generated_pages/techniques/T0036.md index be4b695..81e1dc3 100644 --- a/generated_pages/techniques/T0036.md +++ b/generated_pages/techniques/T0036.md @@ -1,8 +1,8 @@ -# Technique T0036: WhatsApp +# Technique T0036: Create inauthentic websites -* **Summary**: Use WhatsApp as a narrative dissemination channel +* **Summary**: Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0037.md b/generated_pages/techniques/T0037.md index 2fbdd5f..0ba33b7 100644 --- a/generated_pages/techniques/T0037.md +++ b/generated_pages/techniques/T0037.md @@ -1,8 +1,8 @@ -# Technique T0037: Facebook +# Technique T0037: Prepare Physical Broadcast Capabilities -* **Summary**: Use Facebook as a narrative dissemination channel +* **Summary**: Create or coopt broadcast capabilities (e.g. TV, radio etc). -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0038.md b/generated_pages/techniques/T0038.md index 12d22f4..56b2202 100644 --- a/generated_pages/techniques/T0038.md +++ b/generated_pages/techniques/T0038.md @@ -1,8 +1,8 @@ -# Technique T0038: Twitter +# Technique T0038: Develop Owned Media Assets -* **Summary**: Use Twitter as a narrative dissemination channel +* **Summary**: An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content. -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0039.md b/generated_pages/techniques/T0039.md index 1368e45..9a859b2 100644 --- a/generated_pages/techniques/T0039.md +++ b/generated_pages/techniques/T0039.md @@ -1,10 +1,8 @@ -# Technique T0039: Bait legitimate influencers +# Technique T0039: Prepare fundraising campaigns -* **Summary**: Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. +* **Summary**: Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. -By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. - -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0040.md b/generated_pages/techniques/T0040.md index 7331487..49dc4e9 100644 --- a/generated_pages/techniques/T0040.md +++ b/generated_pages/techniques/T0040.md @@ -1,8 +1,8 @@ -# Technique T0040: Demand unsurmountable proof +# Technique T0040: Leverage Content Farm -* **Summary**: Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. +* **Summary**: -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0041.md b/generated_pages/techniques/T0041.md index c492fb7..dad769b 100644 --- a/generated_pages/techniques/T0041.md +++ b/generated_pages/techniques/T0041.md @@ -1,8 +1,8 @@ -# Technique T0041: Deny involvement +# Technique T0041: Compromise legitimate accounts -* **Summary**: Without "smoking gun" proof (and even with proof), incident creator can or will deny involvement. This technique also leverages the attacker advantages outlined in T0040 "Demand unsurmountable proof", specifically the asymmetric disadvantage for truth-tellers in a "firehose of misinformation" environment. +* **Summary**: Hack or take over legimate accounts to distribute misinformation or damaging content. -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0042.md b/generated_pages/techniques/T0042.md index c4b11c3..c56ccca 100644 --- a/generated_pages/techniques/T0042.md +++ b/generated_pages/techniques/T0042.md @@ -1,12 +1,8 @@ -# Technique T0042: Kernel of Truth +# Technique T0042: Create fake experts -* **Summary**: Wrap lies or altered context/facts around truths. +* **Summary**: Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. -Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. - -When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. - -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0043.md b/generated_pages/techniques/T0043.md index 925e308..cc775b3 100644 --- a/generated_pages/techniques/T0043.md +++ b/generated_pages/techniques/T0043.md @@ -1,8 +1,8 @@ -# Technique T0043: Use SMS/ WhatsApp/ Chat apps +# Technique T0043: Create personas -* **Summary**: Direct messaging via encypted app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a diffucult space to monitor, but also a difficult space to build acclaim or notoriety. +* **Summary**: -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0044.md b/generated_pages/techniques/T0044.md index e4930c6..b4e0d83 100644 --- a/generated_pages/techniques/T0044.md +++ b/generated_pages/techniques/T0044.md @@ -1,8 +1,8 @@ -# Technique T0044: Seed distortions +# Technique T0044: Establish Inauthentic News Sites -* **Summary**: Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. +* **Summary**: Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0045.md b/generated_pages/techniques/T0045.md index 277c7f4..b4ab19b 100644 --- a/generated_pages/techniques/T0045.md +++ b/generated_pages/techniques/T0045.md @@ -1,8 +1,9 @@ -# Technique T0045: Use fake experts +# Technique T0045: Prepare Assets Impersonating Legitimate Entities -* **Summary**: Use the fake experts that were set up in T0009. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias +* **Summary**: An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. +An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | @@ -42,7 +43,7 @@ | [C00184 Media exposure](../generated_pages/counters/C00184.md) | D04 | | [C00188 Newsroom/Journalist training to counter influence moves](../generated_pages/counters/C00188.md) | D03 | | [C00195 Redirect searches away from disinformation or extremist content ](../generated_pages/counters/C00195.md) | D02 | -| [C00200 Influencer disavows misinfo](../generated_pages/counters/C00200.md) | D03 | +| [C00200 Respected figure (influencer) disavows misinfo](../generated_pages/counters/C00200.md) | D03 | | [C00203 Stop offering press credentials to propaganda outlets](../generated_pages/counters/C00203.md) | D03 | | [C00211 Use humorous counter-narratives](../generated_pages/counters/C00211.md) | D03 | diff --git a/generated_pages/techniques/T0046.md b/generated_pages/techniques/T0046.md index 59de524..ed4628f 100644 --- a/generated_pages/techniques/T0046.md +++ b/generated_pages/techniques/T0046.md @@ -1,8 +1,11 @@ -# Technique T0046: Search Engine Optimization +# Technique T0046: Co-opt Trusted Sources -* **Summary**: Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" +* **Summary**: An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: +- National or local new outlets +- Research or academic publications +- Online blogs or websites -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0047.md b/generated_pages/techniques/T0047.md index b24e1fe..e12da70 100644 --- a/generated_pages/techniques/T0047.md +++ b/generated_pages/techniques/T0047.md @@ -1,8 +1,8 @@ -# Technique T0047: Muzzle social media as a political force +# Technique T0047: Create Clickbait -* **Summary**: Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports. +* **Summary**: Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0048.md b/generated_pages/techniques/T0048.md index fcd2707..5482a2b 100644 --- a/generated_pages/techniques/T0048.md +++ b/generated_pages/techniques/T0048.md @@ -1,8 +1,8 @@ -# Technique T0048: Cow online opinion leaders +# Technique T0048: Purchase Targeted Advertisements -* **Summary**: Intimidate, coerce, threaten critics/dissidents/journalists via trolling, doxing. +* **Summary**: Create or fund advertisements targeted at specific populations -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0049.md b/generated_pages/techniques/T0049.md index 0b9f086..de3270f 100644 --- a/generated_pages/techniques/T0049.md +++ b/generated_pages/techniques/T0049.md @@ -1,8 +1,8 @@ -# Technique T0049: Flooding +# Technique T0049: Create Localized Content -* **Summary**: Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. +* **Summary**: Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0050.md b/generated_pages/techniques/T0050.md index 4512eee..95bfbf6 100644 --- a/generated_pages/techniques/T0050.md +++ b/generated_pages/techniques/T0050.md @@ -1,8 +1,8 @@ -# Technique T0050: Cheerleading domestic social media ops +# Technique T0050: Leverage Echo Chambers/Filter Bubbles -* **Summary**: Deploy state-coordinated social media commenters and astroturfers. Both internal/domestic and external social media influence operations. +* **Summary**: An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0051.md b/generated_pages/techniques/T0051.md index 15bcfb1..5e53357 100644 --- a/generated_pages/techniques/T0051.md +++ b/generated_pages/techniques/T0051.md @@ -1,6 +1,6 @@ -# Technique T0051: Fabricate social media comment +# Technique T0051: Chat apps -* **Summary**: Use government-paid social media commenters, astroturfers, chat bots (programmed to reply to specific key words/hashtags) influence online conversations, product reviews, web-site comment forums. +* **Summary**: Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety. * **Belongs to tactic stage**: TA09 diff --git a/generated_pages/techniques/T0052.md b/generated_pages/techniques/T0052.md index 4273532..2668fc3 100644 --- a/generated_pages/techniques/T0052.md +++ b/generated_pages/techniques/T0052.md @@ -1,6 +1,6 @@ -# Technique T0052: Tertiary sites amplify news +# Technique T0052: Livestream -* **Summary**: Create content/news/opinion web-sites to cross-post stories. Tertiary sites circulate and amplify narratives. Often these sites have no masthead, bylines or attribution. +* **Summary**: * **Belongs to tactic stage**: TA09 diff --git a/generated_pages/techniques/T0053.md b/generated_pages/techniques/T0053.md index 0f401b7..7449b77 100644 --- a/generated_pages/techniques/T0053.md +++ b/generated_pages/techniques/T0053.md @@ -1,6 +1,6 @@ -# Technique T0053: Twitter trolls amplify and manipulate +# Technique T0053: Social Networks -* **Summary**: Use trolls to amplify narratives and/or manipulate narratives. Fake profiles/sockpuppets operating to support individuals/narratives from the entire political spectrum (left/right binary). Operating with increased emphasis on promoting local content and promoting real Twitter users generating their own, often divisive political content, as it's easier to amplify existing content than create new/original content. Trolls operate where ever there's a socially divisive issue (issues that can/are be politicized). +* **Summary**: * **Belongs to tactic stage**: TA09 diff --git a/generated_pages/techniques/T0054.md b/generated_pages/techniques/T0054.md index 4dbb137..4020df9 100644 --- a/generated_pages/techniques/T0054.md +++ b/generated_pages/techniques/T0054.md @@ -1,6 +1,6 @@ -# Technique T0054: Twitter bots amplify +# Technique T0054: Media Sharing Networks -* **Summary**: Use bots to amplify narratives above algorithm thresholds. Bots are automated/programmed profiles designed to amplify content (ie: automatically retweet or like) and give appearance it's more "popular" than it is. They can operate as a network, to function in a coordinated/orchestrated manner. In some cases (more so now) they are an inexpensive/disposable assets used for minimal deployment as bot detection tools improve and platforms are more responsive. +* **Summary**: Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud. * **Belongs to tactic stage**: TA09 diff --git a/generated_pages/techniques/T0055.md b/generated_pages/techniques/T0055.md index cb18cca..02e8f28 100644 --- a/generated_pages/techniques/T0055.md +++ b/generated_pages/techniques/T0055.md @@ -1,6 +1,6 @@ -# Technique T0055: Use hashtag +# Technique T0055: Discussion Forums -* **Summary**: Use a dedicated hashtag for the incident - either create a campaign/incident specific hashtag, or take over an existing hashtag. +* **Summary**: Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc. * **Belongs to tactic stage**: TA09 diff --git a/generated_pages/techniques/T0056.md b/generated_pages/techniques/T0056.md index ba51f97..1009c16 100644 --- a/generated_pages/techniques/T0056.md +++ b/generated_pages/techniques/T0056.md @@ -1,6 +1,6 @@ -# Technique T0056: Dedicated channels disseminate information pollution +# Technique T0056: Bookmarking and Content Curation -* **Summary**: Output information pollution (e.g. articles on an unreported false story/event) through channels controlled by or related to the incident creator. +* **Summary**: Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc. * **Belongs to tactic stage**: TA09 diff --git a/generated_pages/techniques/T0057.md b/generated_pages/techniques/T0057.md index aabc0a5..7c9b22f 100644 --- a/generated_pages/techniques/T0057.md +++ b/generated_pages/techniques/T0057.md @@ -1,8 +1,8 @@ -# Technique T0057: Organise remote rallies and events +# Technique T0057: Blogging and Publishing Networks -* **Summary**: Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. +* **Summary**: Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0058.md b/generated_pages/techniques/T0058.md index 392c837..6fee781 100644 --- a/generated_pages/techniques/T0058.md +++ b/generated_pages/techniques/T0058.md @@ -1,8 +1,8 @@ -# Technique T0058: Legacy web content +# Technique T0058: Consumer Review Networks -* **Summary**: Make incident content visible for a long time, e.g. by exploiting platform terms of service, or placing it where it's hard to remove or unlikely to be removed. +* **Summary**: Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc. -* **Belongs to tactic stage**: TA11 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0059.md b/generated_pages/techniques/T0059.md index 3aa9610..0e914fc 100644 --- a/generated_pages/techniques/T0059.md +++ b/generated_pages/techniques/T0059.md @@ -1,10 +1,8 @@ -# Technique T0059: Play the long game +# Technique T0059: Online polls -* **Summary**: Play the long game can mean a couple of things: -1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold -2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. +* **Summary**: Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well -* **Belongs to tactic stage**: TA11 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0060.md b/generated_pages/techniques/T0060.md index bfb5d0e..160b514 100644 --- a/generated_pages/techniques/T0060.md +++ b/generated_pages/techniques/T0060.md @@ -1,8 +1,8 @@ -# Technique T0060: Continue to amplify +# Technique T0060: Formal Diplomatic Channels -* **Summary**: continue narrative or message amplification after the main incident work has finished +* **Summary**: -* **Belongs to tactic stage**: TA11 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0061.md b/generated_pages/techniques/T0061.md index f0460f9..e9e7b33 100644 --- a/generated_pages/techniques/T0061.md +++ b/generated_pages/techniques/T0061.md @@ -1,8 +1,8 @@ -# Technique T0061: Sell merchandising +# Technique T0061: Traditional Media -* **Summary**: Sell hats, t-shirts, flags and other branded content that's designed to be seen in the real world +* **Summary**: Examples include TV, Newspaper, Radio, etc. -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0062.md b/generated_pages/techniques/T0062.md index 729be22..08b4dad 100644 --- a/generated_pages/techniques/T0062.md +++ b/generated_pages/techniques/T0062.md @@ -1,8 +1,8 @@ -# Technique T0062: Behaviour changes +# Technique T0062: Email -* **Summary**: Monitor and evaluate behaviour changes from misinformation incidents. +* **Summary**: -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0063.md b/generated_pages/techniques/T0063.md index 7e51495..ca04797 100644 --- a/generated_pages/techniques/T0063.md +++ b/generated_pages/techniques/T0063.md @@ -1,8 +1,8 @@ -# Technique T0063: Message reach +# Technique T0063: Trial content -* **Summary**: Monitor and evaluate message reach in misinformation incidents. +* **Summary**: Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0064.md b/generated_pages/techniques/T0064.md index b42e84b..e0d285a 100644 --- a/generated_pages/techniques/T0064.md +++ b/generated_pages/techniques/T0064.md @@ -1,8 +1,8 @@ -# Technique T0064: Social media engagement +# Technique T0064: Bait legitimate influencers -* **Summary**: Monitor and evaluate social media engagement in misinformation incidents. +* **Summary**: Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0065.md b/generated_pages/techniques/T0065.md index 0f816d4..ebe6502 100644 --- a/generated_pages/techniques/T0065.md +++ b/generated_pages/techniques/T0065.md @@ -1,8 +1,8 @@ -# Technique T0065: Use physical broadcast capabilities +# Technique T0065: Seed Kernel of truth -* **Summary**: Create or coopt broadcast capabilities (e.g. TV, radio etc). +* **Summary**: Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0066.md b/generated_pages/techniques/T0066.md index 11a9814..00eaadc 100644 --- a/generated_pages/techniques/T0066.md +++ b/generated_pages/techniques/T0066.md @@ -1,8 +1,8 @@ -# Technique T0066: Degrade adversary +# Technique T0066: Seed distortions -* **Summary**: Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation. +* **Summary**: Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0067.md b/generated_pages/techniques/T0067.md index 16567d6..97b2847 100644 --- a/generated_pages/techniques/T0067.md +++ b/generated_pages/techniques/T0067.md @@ -1,8 +1,8 @@ -# Technique T0067: Plan to discredit credible sources +# Technique T0067: Use fake experts -* **Summary**: Plan to delegitimize the media landscape and degrade public trust in reporting, by discrediting credible sources. This makes it easier to promote influence operation content. +* **Summary**: Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0068.md b/generated_pages/techniques/T0068.md index 6494efb..2980a7d 100644 --- a/generated_pages/techniques/T0068.md +++ b/generated_pages/techniques/T0068.md @@ -1,8 +1,8 @@ -# Technique T0068: Respond to breaking news event +# Technique T0068: Use Search Engine Optimization -* **Summary**: Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. +* **Summary**: Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0069.md b/generated_pages/techniques/T0069.md index 75a0402..79c1548 100644 --- a/generated_pages/techniques/T0069.md +++ b/generated_pages/techniques/T0069.md @@ -1,8 +1,8 @@ -# Technique T0069: Respond to active crisis +# Technique T0069: Employ Commercial Analytic Firms -* **Summary**: Panic, rumors, and speculation are heightened during active crises (violent events, natural disasters, public health phenomena, etc); these are all vulnerable to manipulation. +* **Summary**: Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0070.md b/generated_pages/techniques/T0070.md index c20fd94..aa165fb 100644 --- a/generated_pages/techniques/T0070.md +++ b/generated_pages/techniques/T0070.md @@ -1,8 +1,8 @@ -# Technique T0070: Analyze existing communities +# Technique T0070: Deliver Ads -* **Summary**: Assess influence operation potential of existing social media communities, where communities share interests, experiences, politics, or other characteristics that join online users together. Assessment includes the potential use of social group trauma that could be targeted to gain support, using emotional appeals to shared grievances in a set population. +* **Summary**: Delivering content via any form of paid media or advertising. -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA11 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0071.md b/generated_pages/techniques/T0071.md index acb2036..d3cc896 100644 --- a/generated_pages/techniques/T0071.md +++ b/generated_pages/techniques/T0071.md @@ -1,8 +1,8 @@ -# Technique T0071: Find echo chambers +# Technique T0071: Post Content -* **Summary**: Find or plan to create areas (social media groups, search term groups, hashtag groups etc) where individuals only engage with people they agree with. +* **Summary**: Delivering content by posting via owned media (assets that the operator controls). -* **Belongs to tactic stage**: TA13 +* **Belongs to tactic stage**: TA11 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0072.md b/generated_pages/techniques/T0072.md index bc48ff2..cd2d2fd 100644 --- a/generated_pages/techniques/T0072.md +++ b/generated_pages/techniques/T0072.md @@ -1,8 +1,8 @@ -# Technique T0072: Segment audiences +# Technique T0072: Comment or Reply on Content -* **Summary**: Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. +* **Summary**: Delivering content by replying or commenting via owned media (assets that the operator controls). -* **Belongs to tactic stage**: TA13 +* **Belongs to tactic stage**: TA11 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0073.md b/generated_pages/techniques/T0073.md new file mode 100644 index 0000000..4a9dde8 --- /dev/null +++ b/generated_pages/techniques/T0073.md @@ -0,0 +1,17 @@ +# Technique T0073: Attract Traditional Media + +* **Summary**: Deliver content by attracting the attention of traditional media (earned media). + +* **Belongs to tactic stage**: TA11 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0074.md b/generated_pages/techniques/T0074.md new file mode 100644 index 0000000..8562716 --- /dev/null +++ b/generated_pages/techniques/T0074.md @@ -0,0 +1,17 @@ +# Technique T0074: Flooding the Information Space + +* **Summary**: Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0075.md b/generated_pages/techniques/T0075.md new file mode 100644 index 0000000..10bfc69 --- /dev/null +++ b/generated_pages/techniques/T0075.md @@ -0,0 +1,17 @@ +# Technique T0075: Amplify Existing Narrative + +* **Summary**: An influence operation may amplify existing narratives that align with its narratives to support operation objectives. + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0076.md b/generated_pages/techniques/T0076.md new file mode 100644 index 0000000..3bfd226 --- /dev/null +++ b/generated_pages/techniques/T0076.md @@ -0,0 +1,17 @@ +# Technique T0076: Cross-Posting + +* **Summary**: Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0077.md b/generated_pages/techniques/T0077.md new file mode 100644 index 0000000..d89f16f --- /dev/null +++ b/generated_pages/techniques/T0077.md @@ -0,0 +1,17 @@ +# Technique T0077: Incentivize Sharing + +* **Summary**: Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content. + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0078.md b/generated_pages/techniques/T0078.md new file mode 100644 index 0000000..a0d459e --- /dev/null +++ b/generated_pages/techniques/T0078.md @@ -0,0 +1,17 @@ +# Technique T0078: Manipulate Platform Algorithm + +* **Summary**: Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0079.md b/generated_pages/techniques/T0079.md new file mode 100644 index 0000000..501b17c --- /dev/null +++ b/generated_pages/techniques/T0079.md @@ -0,0 +1,17 @@ +# Technique T0079: Direct Users to Alternative Platforms + +* **Summary**: Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0080.md b/generated_pages/techniques/T0080.md new file mode 100644 index 0000000..37a9b0d --- /dev/null +++ b/generated_pages/techniques/T0080.md @@ -0,0 +1,17 @@ +# Technique T0080: Harass + +* **Summary**: Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. + +* **Belongs to tactic stage**: TA13 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0081.md b/generated_pages/techniques/T0081.md new file mode 100644 index 0000000..a111335 --- /dev/null +++ b/generated_pages/techniques/T0081.md @@ -0,0 +1,17 @@ +# Technique T0081: Censor social media as a political force + +* **Summary**: Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports). + +* **Belongs to tactic stage**: TA13 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0082.md b/generated_pages/techniques/T0082.md new file mode 100644 index 0000000..ca7ae92 --- /dev/null +++ b/generated_pages/techniques/T0082.md @@ -0,0 +1,17 @@ +# Technique T0082: Control Information Environment through Offensive Cyberspace Operations + +* **Summary**: Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging. + +* **Belongs to tactic stage**: TA13 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0083.md b/generated_pages/techniques/T0083.md new file mode 100644 index 0000000..2d926fb --- /dev/null +++ b/generated_pages/techniques/T0083.md @@ -0,0 +1,17 @@ +# Technique T0083: Suppress Opposition + +* **Summary**: + +* **Belongs to tactic stage**: TA13 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0084.md b/generated_pages/techniques/T0084.md new file mode 100644 index 0000000..e019e28 --- /dev/null +++ b/generated_pages/techniques/T0084.md @@ -0,0 +1,17 @@ +# Technique T0084: Platform Filtering + +* **Summary**: Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation) + +* **Belongs to tactic stage**: TA13 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0085.md b/generated_pages/techniques/T0085.md new file mode 100644 index 0000000..b222a52 --- /dev/null +++ b/generated_pages/techniques/T0085.md @@ -0,0 +1,17 @@ +# Technique T0085: Encourage Attendance at Events + +* **Summary**: Operation encourages attendance at existing real world event. + +* **Belongs to tactic stage**: TA14 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0086.md b/generated_pages/techniques/T0086.md new file mode 100644 index 0000000..c97d329 --- /dev/null +++ b/generated_pages/techniques/T0086.md @@ -0,0 +1,17 @@ +# Technique T0086: Organize Events + +* **Summary**: Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. + +* **Belongs to tactic stage**: TA14 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0087.md b/generated_pages/techniques/T0087.md new file mode 100644 index 0000000..49eed0a --- /dev/null +++ b/generated_pages/techniques/T0087.md @@ -0,0 +1,17 @@ +# Technique T0087: Conduct fundraising + +* **Summary**: Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. + +* **Belongs to tactic stage**: TA14 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0088.md b/generated_pages/techniques/T0088.md new file mode 100644 index 0000000..b6e006d --- /dev/null +++ b/generated_pages/techniques/T0088.md @@ -0,0 +1,17 @@ +# Technique T0088: Physical Violence + +* **Summary**: Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. + +* **Belongs to tactic stage**: TA14 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0089.md b/generated_pages/techniques/T0089.md new file mode 100644 index 0000000..cae679d --- /dev/null +++ b/generated_pages/techniques/T0089.md @@ -0,0 +1,17 @@ +# Technique T0089: Merchandising/ Advertising + +* **Summary**: Merchandising/Advertising refers to getting the message or narrative into physical space in the offline world + +* **Belongs to tactic stage**: TA14 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0090.md b/generated_pages/techniques/T0090.md new file mode 100644 index 0000000..dfc2d3b --- /dev/null +++ b/generated_pages/techniques/T0090.md @@ -0,0 +1,17 @@ +# Technique T0090: Conceal People + +* **Summary**: Conceal the identity or provenance of the account and people assets. + +* **Belongs to tactic stage**: TA15 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0091.md b/generated_pages/techniques/T0091.md new file mode 100644 index 0000000..36a6711 --- /dev/null +++ b/generated_pages/techniques/T0091.md @@ -0,0 +1,17 @@ +# Technique T0091: Conceal Operational Activity + +* **Summary**: + +* **Belongs to tactic stage**: TA15 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0092.md b/generated_pages/techniques/T0092.md new file mode 100644 index 0000000..07cfccf --- /dev/null +++ b/generated_pages/techniques/T0092.md @@ -0,0 +1,17 @@ +# Technique T0092: Conceal Infrastructure + +* **Summary**: + +* **Belongs to tactic stage**: TA15 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0093.md b/generated_pages/techniques/T0093.md new file mode 100644 index 0000000..4aa6e2b --- /dev/null +++ b/generated_pages/techniques/T0093.md @@ -0,0 +1,17 @@ +# Technique T0093: Exploit TOS/Content Moderation + +* **Summary**: + +* **Belongs to tactic stage**: TA15 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0094.md b/generated_pages/techniques/T0094.md new file mode 100644 index 0000000..ce174f5 --- /dev/null +++ b/generated_pages/techniques/T0094.md @@ -0,0 +1,17 @@ +# Technique T0094: Play the long game + +* **Summary**: Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. + +* **Belongs to tactic stage**: TA15 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0095.md b/generated_pages/techniques/T0095.md new file mode 100644 index 0000000..8407e89 --- /dev/null +++ b/generated_pages/techniques/T0095.md @@ -0,0 +1,17 @@ +# Technique T0095: Measure Performance + +* **Summary**: + +* **Belongs to tactic stage**: TA16 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0096.md b/generated_pages/techniques/T0096.md new file mode 100644 index 0000000..1d6c898 --- /dev/null +++ b/generated_pages/techniques/T0096.md @@ -0,0 +1,17 @@ +# Technique T0096: Measure Effectiveness + +* **Summary**: + +* **Belongs to tactic stage**: TA16 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0097.md b/generated_pages/techniques/T0097.md new file mode 100644 index 0000000..5fe0f4a --- /dev/null +++ b/generated_pages/techniques/T0097.md @@ -0,0 +1,17 @@ +# Technique T0097: Measure Effectiveness Indicators (or KPIs) + +* **Summary**: + +* **Belongs to tactic stage**: TA16 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques_index.md b/generated_pages/techniques_index.md index efd4c94..2707c55 100644 --- a/generated_pages/techniques_index.md +++ b/generated_pages/techniques_index.md @@ -9,447 +9,590 @@ T0001 -5Ds (dismiss, distort, distract, dismay, divide) -Nimmo's "4Ds of propaganda": dismiss, distort, distract, dismay (MisinfosecWG added divide in 2019). Misinformation promotes an agenda by advancing narratives supportive of that agenda. This is most effective when the advanced narrative pre-dates the revelation of the specific misinformation content. This is often not possible. +Determine Target Audiences + TA01 T0002 -Facilitate State Propaganda -Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda. +Determine Strategic Ends + TA01 T0003 -Leverage Existing Narratives -Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. -TA01 +Dismiss +Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased. +TA02 T0004 -Devise Competing Narratives -Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. - -Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. - -These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. -TA01 +Distort +Twist the narrative. Take information, or artifacts like images, and change the framing around them. +TA02 + + +T0005 +Distract +Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they’ve accused you of (e.g. police brutality). +TA02 T0006 -Develop Narrative Concepts -The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a "whole of society" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion consitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline. +Dismay +Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story. TA02 T0007 -Create fake Social Media Profiles / Pages / Groups -Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. - -Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. - -TA03 +Divide +Create conflict between subgroups, to widen divisions in a community +TA02 T0008 -Create fake or imposter news sites -Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. -TA03 +Degrade Adversary +Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation. +TA02 T0009 -Create fake experts -Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. -TA03 +Facilitate State Propaganda +Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda. +TA02 T0010 -Cultivate ignorant agents -Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". -TA04 +Map Target Audience Information Environment +Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. +Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging. +TA03 T0011 -Compromise legitimate account -Hack or take over legimate accounts to distribute misinformation or damaging content. -TA04 +Identify Social and Technical Vulnerabilities +Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. +Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. +TA03 T0012 -Use concealment -Use anonymous social media profiles. Examples include page or group administrators, masked "whois" website directory data, no bylines connected to news article, no masthead connect to news websites. -TA04 +Segment Audiences +Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. +TA03 T0013 -Create fake websites -Create media assets to support fake organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. +Develop New Narratives + TA04 T0014 -Prepare fundraising campaigns -Generate revenue through new or existing funding campaigns. e.g. Gather data, advance credible persona via Gofundme; Patreon; or via fake website connecting via PayPal or Stripe. +Leverage Existing Narratives +Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. TA04 T0015 -Create hashtags -Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). +Develop Competing Narratives +Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. TA04 T0016 -Clickbait -Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset -TA05 +Leverage Conspiracy Theory Narratives +"Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. +TA04 T0017 -Conduct Fundraising Campaigns -Drive traffic/engagement to funding campaign sites; helps provide measurable metrics to assess conversion rates -TA05 +Integrate Target Audience Vulnerabilities into Narrative +An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment. +TA04 T0018 -Purchase advertisements -Create or fund advertisements targeted at specific populations -TA05 +Respond to Breaking News Event or Active Crisis +Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. +TA04 T0019 -Generate information pollution -Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. -TA06 +Demand insurmountable proof +Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. +TA04 T0020 -Trial content -Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates -TA06 +Reuse Existing Content +When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. +TA05 T0021 -Memes -Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns. -TA06 +Develop Text-based Content + +TA05 T0022 -Conspiracy narratives -"Conspiracy narratives appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the ""firehose of falsehoods"" model. -TA06 +Develop Image-based Content + +TA05 T0023 -Distort facts -Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content -TA06 +Develop Video-based Content + +TA05 T0024 -Create fake videos and images -Create fake videos and/or images by manipulating existing content or generating new content (e.g. deepfakes). -TA06 +Develop Audio-based Content + +TA05 T0025 -Leak altered documents -Obtain documents (eg by theft or leak), then alter and release, possibly among factual documents/sources. -TA06 +Generate information pollution +Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. +TA05 T0026 -Create pseudoscientific or disingenuous research -Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx -TA06 +Distort facts +Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content +TA05 T0027 -Adapt existing narratives -Adapting existing narratives to current operational goals is the tactical sweet-spot for an effective misinformation campaign. Leveraging existing narratives is not only more effective, it requires substantially less resourcing, as the promotion of new master narratives operates on a much larger scale, both time and scope. Fluid, dynamic & often interchangeable key master narratives can be ("The morally corrupt West") adapted to divisive (LGBT propaganda) or to distort (individuals working as CIA operatives). For Western audiences, different but equally powerful framings are available, such as "USA has a fraught history in race relations, especially in criminal justice areas." -TA06 +Create hashtags and search artifacts +Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). +TA05 T0028 -Create competing narratives -Misinformation promotes an agenda by advancing narratives supportive of that agenda. This is most effective when the advanced narrative pre-dates the revelation of the specific misinformation content. But this is often not possible. - -Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. - -These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the *firehose of misinformation* approach. -TA06 +Obtain Private Documents + +TA05 T0029 -Manipulate online polls -Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well -TA07 +Create Inauthentic Accounts + +TA06 T0030 -Backstop personas -Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believability -TA07 +Recruit bad actors + +TA06 T0031 -YouTube -Use YouTube as a narrative dissemination channel -TA07 +Cultivate ignorant agents +Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". +TA06 T0032 -Reddit -Use Reddit as a narrative dissemination channel -TA07 +Build Network + +TA06 T0033 -Instagram -Use Instagram as a narrative dissemination channel -TA07 +Acquire/ recruit Network + +TA06 T0034 -LinkedIn -Use LinkedIn as a narrative dissemination channel -TA07 +Infiltrate Existing Networks + +TA06 T0035 -Pinterest -Use Pinterest as a narrative dissemination channel -TA07 +Create Inauthentic Social Media Pages and Groups +Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. +TA06 T0036 -WhatsApp -Use WhatsApp as a narrative dissemination channel -TA07 +Create inauthentic websites +Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. +TA06 T0037 -Facebook -Use Facebook as a narrative dissemination channel -TA07 +Prepare Physical Broadcast Capabilities +Create or coopt broadcast capabilities (e.g. TV, radio etc). +TA06 T0038 -Twitter -Use Twitter as a narrative dissemination channel -TA07 +Develop Owned Media Assets +An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content. +TA06 T0039 -Bait legitimate influencers -Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. - -By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. -TA08 +Prepare fundraising campaigns +Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. +TA06 T0040 -Demand unsurmountable proof -Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. -TA08 +Leverage Content Farm + +TA06 T0041 -Deny involvement -Without "smoking gun" proof (and even with proof), incident creator can or will deny involvement. This technique also leverages the attacker advantages outlined in T0040 "Demand unsurmountable proof", specifically the asymmetric disadvantage for truth-tellers in a "firehose of misinformation" environment. -TA08 +Compromise legitimate accounts +Hack or take over legimate accounts to distribute misinformation or damaging content. +TA07 T0042 -Kernel of Truth -Wrap lies or altered context/facts around truths. - -Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. - -When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. -TA08 +Create fake experts +Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. +TA07 T0043 -Use SMS/ WhatsApp/ Chat apps -Direct messaging via encypted app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a diffucult space to monitor, but also a difficult space to build acclaim or notoriety. -TA08 +Create personas + +TA07 T0044 -Seed distortions -Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. -TA08 +Establish Inauthentic News Sites +Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. +TA07 T0045 -Use fake experts -Use the fake experts that were set up in T0009. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias -TA08 +Prepare Assets Impersonating Legitimate Entities +An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. +An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. +TA07 T0046 -Search Engine Optimization -Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" -TA08 +Co-opt Trusted Sources +An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: +- National or local new outlets +- Research or academic publications +- Online blogs or websites +TA07 T0047 -Muzzle social media as a political force -Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports. -TA09 +Create Clickbait +Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset. +TA08 T0048 -Cow online opinion leaders -Intimidate, coerce, threaten critics/dissidents/journalists via trolling, doxing. -TA09 +Purchase Targeted Advertisements +Create or fund advertisements targeted at specific populations +TA08 T0049 -Flooding -Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. -TA09 +Create Localized Content +Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution. +TA08 T0050 -Cheerleading domestic social media ops -Deploy state-coordinated social media commenters and astroturfers. Both internal/domestic and external social media influence operations. -TA09 +Leverage Echo Chambers/Filter Bubbles +An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. +TA08 T0051 -Fabricate social media comment -Use government-paid social media commenters, astroturfers, chat bots (programmed to reply to specific key words/hashtags) influence online conversations, product reviews, web-site comment forums. +Chat apps +Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety. TA09 T0052 -Tertiary sites amplify news -Create content/news/opinion web-sites to cross-post stories. Tertiary sites circulate and amplify narratives. Often these sites have no masthead, bylines or attribution. +Livestream + TA09 T0053 -Twitter trolls amplify and manipulate -Use trolls to amplify narratives and/or manipulate narratives. Fake profiles/sockpuppets operating to support individuals/narratives from the entire political spectrum (left/right binary). Operating with increased emphasis on promoting local content and promoting real Twitter users generating their own, often divisive political content, as it's easier to amplify existing content than create new/original content. Trolls operate where ever there's a socially divisive issue (issues that can/are be politicized). + Social Networks + TA09 T0054 -Twitter bots amplify -Use bots to amplify narratives above algorithm thresholds. Bots are automated/programmed profiles designed to amplify content (ie: automatically retweet or like) and give appearance it's more "popular" than it is. They can operate as a network, to function in a coordinated/orchestrated manner. In some cases (more so now) they are an inexpensive/disposable assets used for minimal deployment as bot detection tools improve and platforms are more responsive. +Media Sharing Networks +Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud. TA09 T0055 -Use hashtag -Use a dedicated hashtag for the incident - either create a campaign/incident specific hashtag, or take over an existing hashtag. +Discussion Forums +Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc. TA09 T0056 -Dedicated channels disseminate information pollution -Output information pollution (e.g. articles on an unreported false story/event) through channels controlled by or related to the incident creator. +Bookmarking and Content Curation +Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc. TA09 T0057 -Organise remote rallies and events -Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. -TA10 +Blogging and Publishing Networks +Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. +TA09 T0058 -Legacy web content -Make incident content visible for a long time, e.g. by exploiting platform terms of service, or placing it where it's hard to remove or unlikely to be removed. -TA11 +Consumer Review Networks +Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc. +TA09 T0059 -Play the long game -Play the long game can mean a couple of things: -1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold -2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. -TA11 +Online polls +Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well +TA09 T0060 -Continue to amplify -continue narrative or message amplification after the main incident work has finished -TA11 +Formal Diplomatic Channels + +TA09 T0061 -Sell merchandising -Sell hats, t-shirts, flags and other branded content that's designed to be seen in the real world -TA10 +Traditional Media +Examples include TV, Newspaper, Radio, etc. +TA09 T0062 -Behaviour changes -Monitor and evaluate behaviour changes from misinformation incidents. -TA12 +Email + +TA09 T0063 -Message reach -Monitor and evaluate message reach in misinformation incidents. -TA12 +Trial content +Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates +TA10 T0064 -Social media engagement -Monitor and evaluate social media engagement in misinformation incidents. -TA12 +Bait legitimate influencers +Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. +TA10 T0065 -Use physical broadcast capabilities -Create or coopt broadcast capabilities (e.g. TV, radio etc). -TA04 +Seed Kernel of truth +Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. +TA10 T0066 -Degrade adversary -Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation. -TA02 +Seed distortions +Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. +TA10 T0067 -Plan to discredit credible sources -Plan to delegitimize the media landscape and degrade public trust in reporting, by discrediting credible sources. This makes it easier to promote influence operation content. -TA02 +Use fake experts +Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias +TA10 T0068 -Respond to breaking news event -Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. -TA02 +Use Search Engine Optimization +Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" +TA10 T0069 -Respond to active crisis -Panic, rumors, and speculation are heightened during active crises (violent events, natural disasters, public health phenomena, etc); these are all vulnerable to manipulation. -TA02 +Employ Commercial Analytic Firms +Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. +TA10 T0070 -Analyze existing communities -Assess influence operation potential of existing social media communities, where communities share interests, experiences, politics, or other characteristics that join online users together. Assessment includes the potential use of social group trauma that could be targeted to gain support, using emotional appeals to shared grievances in a set population. -TA02 +Deliver Ads +Delivering content via any form of paid media or advertising. +TA11 T0071 -Find echo chambers -Find or plan to create areas (social media groups, search term groups, hashtag groups etc) where individuals only engage with people they agree with. -TA13 +Post Content +Delivering content by posting via owned media (assets that the operator controls). +TA11 T0072 -Segment audiences -Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. +Comment or Reply on Content +Delivering content by replying or commenting via owned media (assets that the operator controls). +TA11 + + +T0073 +Attract Traditional Media +Deliver content by attracting the attention of traditional media (earned media). +TA11 + + +T0074 +Flooding the Information Space +Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. +TA12 + + +T0075 +Amplify Existing Narrative +An influence operation may amplify existing narratives that align with its narratives to support operation objectives. +TA12 + + +T0076 +Cross-Posting +Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. +TA12 + + +T0077 +Incentivize Sharing +Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content. +TA12 + + +T0078 +Manipulate Platform Algorithm +Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. +TA12 + + +T0079 +Direct Users to Alternative Platforms +Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. +TA12 + + +T0080 +Harass +Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. TA13 + +T0081 +Censor social media as a political force +Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports). +TA13 + + +T0082 +Control Information Environment through Offensive Cyberspace Operations +Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging. +TA13 + + +T0083 +Suppress Opposition + +TA13 + + +T0084 +Platform Filtering +Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation) +TA13 + + +T0085 +Encourage Attendance at Events +Operation encourages attendance at existing real world event. +TA14 + + +T0086 +Organize Events +Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. +TA14 + + +T0087 +Conduct fundraising +Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. +TA14 + + +T0088 +Physical Violence +Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. +TA14 + + +T0089 +Merchandising/ Advertising +Merchandising/Advertising refers to getting the message or narrative into physical space in the offline world +TA14 + + +T0090 +Conceal People +Conceal the identity or provenance of the account and people assets. +TA15 + + +T0091 +Conceal Operational Activity + +TA15 + + +T0092 +Conceal Infrastructure + +TA15 + + +T0093 +Exploit TOS/Content Moderation + +TA15 + + +T0094 +Play the long game +Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. +TA15 + + +T0095 +Measure Performance + +TA16 + + +T0096 +Measure Effectiveness + +TA16 + + +T0097 +Measure Effectiveness Indicators (or KPIs) + +TA16 +