subtechnique description updates

Updated subtechniques so that now all have a description. Also made slight name changes to a few techniques and subtechniques but retained the disarm_id and overall nature of all of them
This commit is contained in:
Mike Klein 2022-07-02 15:40:09 -04:00
parent 1da43f79e0
commit c888a7d6f4
683 changed files with 6677 additions and 6679 deletions

View file

@ -86,7 +86,7 @@
<td><a href="techniques/T0128.001.md">T0128.001 Use Pseudonyms</a></td>
<td><a href="techniques/T0132.003.md">T0132.003 View Focused</a></td>
<td><a href="techniques/T0072.003.md">T0072.003 Economic Segmentation</a></td>
<td><a href="techniques/T0022.001.md">T0022.001 Amplify Existing Conspiracy Theory Narrative</a></td>
<td><a href="techniques/T0022.001.md">T0022.001 Amplify Existing Conspiracy Theory Narratives</a></td>
<td><a href="techniques/T0014.md">T0014 Prepare fundraising campaigns</a></td>
<td><a href="techniques/T0097.md">T0097 Create personas</a></td>
<td><a href="techniques/T0049.003.md">T0049.003 Bots Amplify via Automated Forwarding and Reposting</a></td>
@ -105,7 +105,7 @@
<td><a href="techniques/T0133.md">T0133 Measure Effectiveness</a></td>
<td><a href="techniques/T0072.004.md">T0072.004 Psychographic Segmentation</a></td>
<td><a href="techniques/T0022.002.md">T0022.002 Develop Original Conspiracy Theory Narratives</a></td>
<td><a href="techniques/T0014.001.md">T0014.001 From bad actors</a></td>
<td><a href="techniques/T0014.001.md">T0014.001 Raise funds from malign actors</a></td>
<td><a href="techniques/T0097.001.md">T0097.001 Backstop personas </a></td>
<td><a href="techniques/T0049.004.md">T0049.004 Utilize Spamoflauge</a></td>
<td><a href="techniques/T0048.003.md">T0048.003 Threaten to Dox</a></td>
@ -123,7 +123,7 @@
<td><a href="techniques/T0133.001.md">T0133.001 Behavior changes</a></td>
<td><a href="techniques/T0072.005.md">T0072.005 Political Segmentation</a></td>
<td><a href="techniques/T0040.md">T0040 Demand insurmountable proof</a></td>
<td><a href="techniques/T0014.002.md">T0014.002 From ignorant agents</a></td>
<td><a href="techniques/T0014.002.md">T0014.002 Raise funds from ignorant agents</a></td>
<td><a href="techniques/T0098.md">T0098 Establish Inauthentic News Sites</a></td>
<td><a href="techniques/T0049.005.md">T0049.005 Conduct Swarming</a></td>
<td><a href="techniques/T0048.004.md">T0048.004 Dox</a></td>
@ -249,7 +249,7 @@
<td><a href="techniques/T0134.002.md">T0134.002 Social media engagement</a></td>
<td><a href="techniques/T0081.md">T0081 Identify Social and Technical Vulnerabilities</a></td>
<td> </td>
<td><a href="techniques/T0091.md">T0091 Recruit bad actors</a></td>
<td><a href="techniques/T0091.md">T0091 Recruit malign actors</a></td>
<td><a href="techniques/T0100.001.md">T0100.001 Co-Opt Trusted Individuals</a></td>
<td><a href="techniques/T0119.003.md">T0119.003 Post Across Disciplines</a></td>
<td><a href="techniques/T0124.001.md">T0124.001 Report Non-Violative Opposing Content</a></td>
@ -263,7 +263,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0129.005.md">T0129.005 Coordinate on encrypted/ closed networks</a></td>
<td><a href="techniques/T0129.005.md">T0129.005 Coordinate on encrypted/closed networks</a></td>
<td> </td>
<td><a href="techniques/T0081.001.md">T0081.001 Find Echo Chambers</a></td>
<td> </td>
@ -357,7 +357,7 @@
<td> </td>
<td><a href="techniques/T0081.006.md">T0081.006 Identify Wedge Issues</a></td>
<td> </td>
<td><a href="techniques/T0092.002.md">T0092.002 Follow Trains</a></td>
<td><a href="techniques/T0092.002.md">T0092.002 Use Follow Trains</a></td>
<td> </td>
<td><a href="techniques/T0122.md">T0122 Direct Users to Alternative Platforms</a></td>
<td> </td>
@ -366,7 +366,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0086.003.md">T0086.003 Deceptively Edit Image (Cheap fakes)</a></td>
<td><a href="techniques/T0086.003.md">T0086.003 Deceptively Edit Images (Cheap fakes)</a></td>
<td><a href="techniques/T0106.001.md">T0106.001 Anonymous Message Boards</a></td>
<td> </td>
<td> </td>
@ -393,7 +393,7 @@
<td> </td>
<td><a href="techniques/T0081.008.md">T0081.008 Identify Media System Vulnerabilities</a></td>
<td> </td>
<td><a href="techniques/T0093.md">T0093 Acquire/ recruit Network</a></td>
<td><a href="techniques/T0093.md">T0093 Acquire/Recruit Network</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -429,7 +429,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0093.002.md">T0093.002 Botnets</a></td>
<td><a href="techniques/T0093.002.md">T0093.002 Acquire Botnets</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -483,7 +483,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0094.002.md">T0094.002 Utilize Butterfly Attack</a></td>
<td><a href="techniques/T0094.002.md">T0094.002 Utilize Butterfly Attacks</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -519,7 +519,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0096.md">T0096 Leverage Content Farm</a></td>
<td><a href="techniques/T0096.md">T0096 Leverage Content Farms</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -528,7 +528,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0089.001.md">T0089.001 Leak Authentic Documents</a></td>
<td><a href="techniques/T0089.001.md">T0089.001 Obtain Authentic Documents</a></td>
<td><a href="techniques/T0112.md">T0112 Email</a></td>
<td> </td>
<td> </td>
@ -537,7 +537,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0096.001.md">T0096.001 Create a Content Farm</a></td>
<td><a href="techniques/T0096.001.md">T0096.001 Create Content Farms</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -546,7 +546,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0089.002.md">T0089.002 Leak False Documents</a></td>
<td><a href="techniques/T0089.002.md">T0089.002 Create Inauthentic Documents</a></td>
<td> </td>
<td> </td>
<td> </td>
@ -564,7 +564,7 @@
<td> </td>
<td> </td>
<td> </td>
<td><a href="techniques/T0089.003.md">T0089.003 Leak Altered Documents</a></td>
<td><a href="techniques/T0089.003.md">T0089.003 Alter Authentic Documents</a></td>
<td> </td>
<td> </td>
<td> </td>

View file

@ -35,7 +35,7 @@
| [T0086 Develop Image-based Content](../../generated_pages/techniques/T0086.md) |
| [T0086.001 Develop Memes](../../generated_pages/techniques/T0086.001.md) |
| [T0086.002 Develop AI-Generated Images (Deepfakes)](../../generated_pages/techniques/T0086.002.md) |
| [T0086.003 Deceptively Edit Image (Cheap fakes)](../../generated_pages/techniques/T0086.003.md) |
| [T0086.003 Deceptively Edit Images (Cheap fakes)](../../generated_pages/techniques/T0086.003.md) |
| [T0086.004 Aggregate Information into Evidence Collages](../../generated_pages/techniques/T0086.004.md) |
| [T0087 Develop Video-based Content](../../generated_pages/techniques/T0087.md) |
| [T0087.001 Develop AI-Generated Videos (Deepfakes)](../../generated_pages/techniques/T0087.001.md) |
@ -44,9 +44,9 @@
| [T0088.001 Develop AI-Generated Audio (Deepfakes)](../../generated_pages/techniques/T0088.001.md) |
| [T0088.002 Deceptively Edit Audio (Cheap fakes)](../../generated_pages/techniques/T0088.002.md) |
| [T0089 Obtain Private Documents](../../generated_pages/techniques/T0089.md) |
| [T0089.001 Leak Authentic Documents](../../generated_pages/techniques/T0089.001.md) |
| [T0089.002 Leak False Documents](../../generated_pages/techniques/T0089.002.md) |
| [T0089.003 Leak Altered Documents](../../generated_pages/techniques/T0089.003.md) |
| [T0089.001 Obtain Authentic Documents](../../generated_pages/techniques/T0089.001.md) |
| [T0089.002 Create Inauthentic Documents](../../generated_pages/techniques/T0089.002.md) |
| [T0089.003 Alter Authentic Documents](../../generated_pages/techniques/T0089.003.md) |

View file

@ -32,7 +32,7 @@
| [T0129.002 Generate Content Unrelated to Narrative](../../generated_pages/techniques/T0129.002.md) |
| [T0129.003 Break Association with Content](../../generated_pages/techniques/T0129.003.md) |
| [T0129.004 Delete URLs](../../generated_pages/techniques/T0129.004.md) |
| [T0129.005 Coordinate on encrypted/ closed networks](../../generated_pages/techniques/T0129.005.md) |
| [T0129.005 Coordinate on encrypted/closed networks](../../generated_pages/techniques/T0129.005.md) |
| [T0129.006 Deny involvement](../../generated_pages/techniques/T0129.006.md) |
| [T0129.007 Delete Accounts/Account Activity](../../generated_pages/techniques/T0129.007.md) |
| [T0129.008 Redirect URLs](../../generated_pages/techniques/T0129.008.md) |

View file

@ -16,7 +16,7 @@
| [T0003 Leverage Existing Narratives](../../generated_pages/techniques/T0003.md) |
| [T0004 Develop Competing Narratives](../../generated_pages/techniques/T0004.md) |
| [T0022 Leverage Conspiracy Theory Narratives](../../generated_pages/techniques/T0022.md) |
| [T0022.001 Amplify Existing Conspiracy Theory Narrative](../../generated_pages/techniques/T0022.001.md) |
| [T0022.001 Amplify Existing Conspiracy Theory Narratives](../../generated_pages/techniques/T0022.001.md) |
| [T0022.002 Develop Original Conspiracy Theory Narratives](../../generated_pages/techniques/T0022.002.md) |
| [T0040 Demand insurmountable proof](../../generated_pages/techniques/T0040.md) |
| [T0068 Respond to Breaking News Event or Active Crisis](../../generated_pages/techniques/T0068.md) |

View file

@ -27,31 +27,31 @@ Establishing information assets allows an influence operation to promote messagi
| [T0010 Cultivate ignorant agents](../../generated_pages/techniques/T0010.md) |
| [T0013 Create inauthentic websites](../../generated_pages/techniques/T0013.md) |
| [T0014 Prepare fundraising campaigns](../../generated_pages/techniques/T0014.md) |
| [T0014.001 From bad actors](../../generated_pages/techniques/T0014.001.md) |
| [T0014.002 From ignorant agents](../../generated_pages/techniques/T0014.002.md) |
| [T0014.001 Raise funds from malign actors](../../generated_pages/techniques/T0014.001.md) |
| [T0014.002 Raise funds from ignorant agents](../../generated_pages/techniques/T0014.002.md) |
| [T0065 Prepare Physical Broadcast Capabilities](../../generated_pages/techniques/T0065.md) |
| [T0090 Create Inauthentic Accounts](../../generated_pages/techniques/T0090.md) |
| [T0090.001 Create Anonymous Accounts](../../generated_pages/techniques/T0090.001.md) |
| [T0090.002 Create Cyborg Accounts](../../generated_pages/techniques/T0090.002.md) |
| [T0090.003 Create Bot Accounts](../../generated_pages/techniques/T0090.003.md) |
| [T0090.004 Create Sockpuppet Accounts](../../generated_pages/techniques/T0090.004.md) |
| [T0091 Recruit bad actors](../../generated_pages/techniques/T0091.md) |
| [T0091 Recruit malign actors](../../generated_pages/techniques/T0091.md) |
| [T0091.001 Recruit Contractors](../../generated_pages/techniques/T0091.001.md) |
| [T0091.002 Recruit Partisans](../../generated_pages/techniques/T0091.002.md) |
| [T0091.003 Enlist Troll Accounts](../../generated_pages/techniques/T0091.003.md) |
| [T0092 Build Network](../../generated_pages/techniques/T0092.md) |
| [T0092.001 Create Organizations](../../generated_pages/techniques/T0092.001.md) |
| [T0092.002 Follow Trains](../../generated_pages/techniques/T0092.002.md) |
| [T0092.002 Use Follow Trains](../../generated_pages/techniques/T0092.002.md) |
| [T0092.003 Create Community or Sub-group](../../generated_pages/techniques/T0092.003.md) |
| [T0093 Acquire/ recruit Network](../../generated_pages/techniques/T0093.md) |
| [T0093 Acquire/Recruit Network](../../generated_pages/techniques/T0093.md) |
| [T0093.001 Fund Proxies](../../generated_pages/techniques/T0093.001.md) |
| [T0093.002 Botnets](../../generated_pages/techniques/T0093.002.md) |
| [T0093.002 Acquire Botnets](../../generated_pages/techniques/T0093.002.md) |
| [T0094 Infiltrate Existing Networks](../../generated_pages/techniques/T0094.md) |
| [T0094.001 Identify susceptible targets in networks](../../generated_pages/techniques/T0094.001.md) |
| [T0094.002 Utilize Butterfly Attack](../../generated_pages/techniques/T0094.002.md) |
| [T0094.002 Utilize Butterfly Attacks](../../generated_pages/techniques/T0094.002.md) |
| [T0095 Develop Owned Media Assets](../../generated_pages/techniques/T0095.md) |
| [T0096 Leverage Content Farm](../../generated_pages/techniques/T0096.md) |
| [T0096.001 Create a Content Farm](../../generated_pages/techniques/T0096.001.md) |
| [T0096 Leverage Content Farms](../../generated_pages/techniques/T0096.md) |
| [T0096.001 Create Content Farms](../../generated_pages/techniques/T0096.001.md) |
| [T0096.002 Outsource Content Creation to External Organizations](../../generated_pages/techniques/T0096.002.md) |

View file

@ -1,6 +1,6 @@
# Technique T0009.001: Utilize Academic/Pseudoscientific Justifications
* **Summary**:
* **Summary**: Utilize Academic/Pseudoscientific Justifications
* **Belongs to tactic stage**: TA16

View file

@ -1,6 +1,6 @@
# Technique T0014.001: From bad actors
# Technique T0014.001: Raise funds from malign actors
* **Summary**:
* **Summary**: Raising funds from malign actors may include contributions from foreign agents, cutouts or proxies, shell companies, dark money groups, etc.
* **Belongs to tactic stage**: TA15

View file

@ -1,6 +1,6 @@
# Technique T0014.002: From ignorant agents
# Technique T0014.002: Raise funds from ignorant agents
* **Summary**:
* **Summary**: Raising funds from ignorant agents may include scams, donations intended for one stated purpose but then used for another, etc.
* **Belongs to tactic stage**: TA15

View file

@ -1,6 +1,6 @@
# Technique T0017.001: Conduct Crowdfunding Campaigns
* **Summary**:
* **Summary**: An influence operation may Conduct Crowdfunding Campaigns on platforms such as GoFundMe, GiveSendGo, Tipeee, Patreon, etc.
* **Belongs to tactic stage**: TA10

View file

@ -1,6 +1,6 @@
# Technique T0019.002: Hijack Hashtags
* **Summary**:
* **Summary**: Hashtag hijacking occurs when users “[use] a trending hashtag to promote topics that are substantially different from its recent context” (VanDam and Tan, 2016) or “to promote ones own social media agenda” (Darius and Stephany, 2019).
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0022.001: Amplify Existing Conspiracy Theory Narrative
# Technique T0022.001: Amplify Existing Conspiracy Theory Narratives
* **Summary**:
* **Summary**: An influence operation may amplify an existing conspiracy theory narrative that aligns with its incident or campaign goals. By amplifying existing conspiracy theory narratives, operators can leverage the power of the existing communities that support and propagate those theories without needing to expend resources creating new narratives or building momentum and buy in around new narratives.
* **Belongs to tactic stage**: TA14

View file

@ -1,6 +1,6 @@
# Technique T0022.002: Develop Original Conspiracy Theory Narratives
* **Summary**:
* **Summary**: While this requires more resources than amplifying existing conspiracy theory narratives, an influence operation may develop original conspiracy theory narratives in order to achieve greater control and alignment over the narrative and their campaign goals. Prominent examples include the USSR's Operation INFEKTION disinformation campaign run by the KGB in the 1980s to plant the idea that the United States had invented HIV/AIDS as part of a biological weapons research project at Fort Detrick, Maryland. More recently, Fort Detrick featured prominently in a new conspiracy theory narratives around the origins of the COVID-19 outbreak and pandemic.
* **Belongs to tactic stage**: TA14

View file

@ -1,6 +1,6 @@
# Technique T0043.001: Use Encrypted Chat Apps
* **Summary**:
* **Summary**: Examples include Signal, WhatsApp, Discord, Wire, etc.
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0043.002: Use Unencrypted Chats Apps
* **Summary**:
* **Summary**: Examples include SMS, etc.
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0084.002: Plagiarize Content
* **Summary**:
* **Summary**: An influence operation may take content from other sources without proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources.
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0084.003: Deceptively Labeled or Translated
* **Summary**:
* **Summary**: An influence operation may take authentic content from other sources and add deceptive labels or deceptively translate the content into other langauges.
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0084.004: Appropriate Content
* **Summary**:
* **Summary**: An influence operation may take content from other sources with proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources. Examples include the appropriation of content from one inauthentic news site to another inauthentic news site or network in ways that align with the originators licensing or terms of service.
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0085.002: Develop False or Altered Documents
* **Summary**:
* **Summary**: Develop False or Altered Documents
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0085.003: Develop Inauthentic News Articles
* **Summary**:
* **Summary**: An influence operation may develop false or misleading news articles aligned to their campaign goals or narratives.
* **Belongs to tactic stage**: TA06

View file

@ -1,4 +1,4 @@
# Technique T0086.003: Deceptively Edit Image (Cheap fakes)
# Technique T0086.003: Deceptively Edit Images (Cheap fakes)
* **Summary**: Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.

View file

@ -1,6 +1,6 @@
# Technique T0086.004: Aggregate Information into Evidence Collages
* **Summary**: image files that aggregate positive evidence (Joan Donovan)
* **Summary**: Image files that aggregate positive evidence (Joan Donovan)
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0089.001: Leak Authentic Documents
# Technique T0089.001: Obtain Authentic Documents
* **Summary**:
* **Summary**: Procure authentic documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can be "leaked" during later stages in the operation.
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0089.002: Leak False Documents
# Technique T0089.002: Create Inauthentic Documents
* **Summary**:
* **Summary**: Create inauthentic documents intended to appear as if they are authentic non-public documents. These documents can be "leaked" during later stages in the operation.
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0089.003: Leak Altered Documents
# Technique T0089.003: Alter Authentic Documents
* **Summary**: Obtain documents (eg by theft or leak), then alter and release, possibly among factual documents/sources.
* **Summary**: Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic can be "leaked" during later stages in the operation.
* **Belongs to tactic stage**: TA06

View file

@ -1,6 +1,6 @@
# Technique T0091.001: Recruit Contractors
* **Summary**:
* **Summary**: Operators recruit paid contractor to support the campaign.
* **Belongs to tactic stage**: TA15

View file

@ -1,6 +1,6 @@
# Technique T0091.002: Recruit Partisans
* **Summary**:
* **Summary**: Operators recruit partisans (ideologically-aligned individuals) to support the campaign.
* **Belongs to tactic stage**: TA15

View file

@ -1,4 +1,4 @@
# Technique T0091: Recruit bad actors
# Technique T0091: Recruit malign actors
* **Summary**: Operators recruit bad actors paying recruiting, or exerting control over individuals includes trolls, partisans, and contractors.

View file

@ -1,6 +1,6 @@
# Technique T0092.002: Follow Trains
# Technique T0092.002: Use Follow Trains
* **Summary**:
* **Summary**: A follow train is a group of people who follow each other on a social media platform, often as a way for an individual or campaign to grow its social media following. Follow trains may be a violation of platform Terms of Service. They are also known as follow-for-follow groups.
* **Belongs to tactic stage**: TA15

View file

@ -1,6 +1,6 @@
# Technique T0092.003: Create Community or Sub-group
* **Summary**:
* **Summary**: When there is not an existing community or sub-group that meets a campaign's goals, an influence operation may seek to create a community or sub-group.
* **Belongs to tactic stage**: TA15

View file

@ -1,6 +1,6 @@
# Technique T0093.002: Botnets
# Technique T0093.002: Acquire Botnets
* **Summary**:
* **Summary**: A botnet is a group of bots that can function in coordination with each other.
* **Belongs to tactic stage**: TA15

View file

@ -1,4 +1,4 @@
# Technique T0093: Acquire/ recruit Network
# Technique T0093: Acquire/Recruit Network
* **Summary**: Operators acquire an existing network by paying, recruiting, or exerting control over the leaders of the existing network.

View file

@ -1,6 +1,6 @@
# Technique T0094.001: Identify susceptible targets in networks
* **Summary**:
* **Summary**: When seeking to infiltrate an existing network, an influence operation may identify individuals and groups that might be susceptible to being co-opted or influenced.
* **Belongs to tactic stage**: TA15

View file

@ -1,4 +1,4 @@
# Technique T0094.002: Utilize Butterfly Attack
# Technique T0094.002: Utilize Butterfly Attacks
* **Summary**: Butterfly attacks occur when operators pretend to be members of a certain social group, usually a group that struggles for representation. An influence operation may mimic a group to insert controversial statements into the discourse, encourage the spread of operation content, or promote harassment among group members. Unlike astroturfing, butterfly attacks aim to infiltrate and discredit existing grassroots movements, organizations, and media campaigns.

View file

@ -1,6 +1,6 @@
# Technique T0096.001: Create a Content Farm
# Technique T0096.001: Create Content Farms
* **Summary**:
* **Summary**: An influence operation may create an organization for creating and amplifying campaign artifacts at scale.
* **Belongs to tactic stage**: TA15

View file

@ -1,4 +1,4 @@
# Technique T0096: Leverage Content Farm
# Technique T0096: Leverage Content Farms
* **Summary**: Using the services of large-scale content providers for creating and amplifying campaign artifacts at scale.

View file

@ -1,6 +1,6 @@
# Technique T0098.001: Create Inauthentic News Sites
* **Summary**:
* **Summary**: Create Inauthentic News Sites
* **Belongs to tactic stage**: TA16

View file

@ -1,7 +1,6 @@
# Technique T0098.002: Leverage Existing Inauthentic News Sites
* **Summary**: An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities.
An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct.
* **Summary**: Leverage Existing Inauthentic News Sites
* **Belongs to tactic stage**: TA16

View file

@ -1,6 +1,6 @@
# Technique T0099.002: Spoof/parody account/site
* **Summary**:
* **Summary**: An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities.
* **Belongs to tactic stage**: TA16

View file

@ -1,6 +1,6 @@
# Technique T0100.001: Co-Opt Trusted Individuals
* **Summary**:
* **Summary**: Co-Opt Trusted Individuals
* **Belongs to tactic stage**: TA16

View file

@ -1,6 +1,6 @@
# Technique T0100.002: Co-Opt Grassroots Groups
* **Summary**:
* **Summary**: Co-Opt Grassroots Groups
* **Belongs to tactic stage**: TA16

View file

@ -1,6 +1,6 @@
# Technique T0100.003: Co-opt Influencers
* **Summary**:
* **Summary**: Co-opt Influencers
* **Belongs to tactic stage**: TA16

View file

@ -1,6 +1,6 @@
# Technique T0102.001: Use existing Echo Chambers/Filter Bubbles
* **Summary**:
* **Summary**: Use existing Echo Chambers/Filter Bubbles
* **Belongs to tactic stage**: TA05

View file

@ -1,6 +1,6 @@
# Technique T0102.002: Create Echo Chambers/Filter Bubbles
* **Summary**:
* **Summary**: Create Echo Chambers/Filter Bubbles
* **Belongs to tactic stage**: TA05

View file

@ -1,6 +1,6 @@
# Technique T0104.001: Mainstream Social Networks
* **Summary**: Examples include Facebook, Twitter, LinkedIn, VK,
* **Summary**: Examples include Facebook, Twitter, LinkedIn, etc.
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0104.002: Dating Apps
* **Summary**:
* **Summary**: A video livestream refers to an online video broadcast capability that allows for real-time communication to closed or open networks. Examples include Facebook Live, Instagram, Youtube, Tik Tok, and Twitter.
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0104.003: Private/Closed Social Networks
* **Summary**:
* **Summary**: An audio livestream refers to an online audio broadcast capability that allows for real-time communication to closed or open networks. Examples include Twitter Spaces,
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0111.001: TV
* **Summary**:
* **Summary**: TV
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0111.002: Newspaper
* **Summary**:
* **Summary**: Newspaper
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0111.003: Radio
* **Summary**:
* **Summary**: Radio
* **Belongs to tactic stage**: TA07

View file

@ -1,6 +1,6 @@
# Technique T0114.001: Social media
* **Summary**:
* **Summary**: Social Media
* **Belongs to tactic stage**: TA09

View file

@ -1,6 +1,6 @@
# Technique T0115.002: Post Violative Content to Provoke Takedown and Backlash
* **Summary**:
* **Summary**: Post Violative Content to Provoke Takedown and Backlash.
* **Belongs to tactic stage**: TA09

View file

@ -1,6 +1,6 @@
# Technique T0119.001: Post Across Groups
* **Summary**:
* **Summary**: An influence operation may post content across groups to spread narratives and content to new communities within the target audiences or to new target audiences.
* **Belongs to tactic stage**: TA17

View file

@ -1,6 +1,6 @@
# Technique T0119.002: Post Across Platform
* **Summary**:
* **Summary**: An influence operation may post content across platforms to spread narratives and content to new communities within the target audiences or to new target audiences. Posting across platforms can also remove opposition and context, helping the narrative spread with less opposition on the cross-posted platform.
* **Belongs to tactic stage**: TA17

View file

@ -1,6 +1,6 @@
# Technique T0119.003: Post Across Disciplines
* **Summary**:
* **Summary**: Post Across Disciplines
* **Belongs to tactic stage**: TA17

View file

@ -1,6 +1,6 @@
# Technique T0120.001: Use Affiliate Marketing Programs
* **Summary**:
* **Summary**: Use Affiliate Marketing Programs
* **Belongs to tactic stage**: TA17

View file

@ -1,6 +1,6 @@
# Technique T0120.002: Use Contests and Prizes
* **Summary**:
* **Summary**: Use Contests and Prizes
* **Belongs to tactic stage**: TA17

View file

@ -1,6 +1,6 @@
# Technique T0124.003: Exploit Platform TOS/Content Moderation
* **Summary**:
* **Summary**: Exploit Platform TOS/Content Moderation
* **Belongs to tactic stage**: TA18

View file

@ -1,6 +1,6 @@
# Technique T0126.001: Call to action to attend
* **Summary**:
* **Summary**: Call to action to attend an event
* **Belongs to tactic stage**: TA10

View file

@ -1,6 +1,6 @@
# Technique T0127.001: Conduct Physical Violence
* **Summary**:
* **Summary**: An influence operation may directly Conduct Physical Violence to achieve campaign goals.
* **Belongs to tactic stage**: TA10

View file

@ -1,6 +1,6 @@
# Technique T0127.002: Encourage Physical Violence
* **Summary**:
* **Summary**: An influence operation may Encourage others to engage in Physical Violence to achieve campaign goals.
* **Belongs to tactic stage**: TA10

View file

@ -1,6 +1,6 @@
# Technique T0129.005: Coordinate on encrypted/ closed networks
# Technique T0129.005: Coordinate on encrypted/closed networks
* **Summary**:
* **Summary**: Coordinate on encrypted/ closed networks
* **Belongs to tactic stage**: TA11

View file

@ -1,6 +1,6 @@
# Technique T0130.003: Use Shell Organizations
* **Summary**:
* **Summary**: Use Shell Organizations to conceal sponsorship.
* **Belongs to tactic stage**: TA11

View file

@ -1,6 +1,6 @@
# Technique T0130.004: Use Cryptocurrency
* **Summary**:
* **Summary**: Use Cryptocurrency to conceal sponsorship. Examples include Bitcoin, Monero, and Etherium.
* **Belongs to tactic stage**: TA11

View file

@ -1,6 +1,6 @@
# Technique T0130.005: Obfuscate Payment
* **Summary**:
* **Summary**: Obfuscate Payment
* **Belongs to tactic stage**: TA11

View file

@ -1,6 +1,6 @@
# Technique T0131.002: Post Borderline Content
* **Summary**:
* **Summary**: Post Borderline Content
* **Belongs to tactic stage**: TA11

View file

@ -1,6 +1,6 @@
# Technique T0132.001: People Focused
* **Summary**:
* **Summary**: Measure the performance individuals in achieving campaign goals
* **Belongs to tactic stage**: TA12

View file

@ -1,6 +1,6 @@
# Technique T0132.002: Content Focused
* **Summary**:
* **Summary**: Measure the performance of campaign content
* **Belongs to tactic stage**: TA12

View file

@ -1,6 +1,6 @@
# Technique T0132.003: View Focused
* **Summary**:
* **Summary**: View Focused
* **Belongs to tactic stage**: TA12

View file

@ -1,6 +1,6 @@
# Technique T0133.002: Content
* **Summary**:
* **Summary**: Measure current system state with respect to the effectiveness of campaign content.
* **Belongs to tactic stage**: TA12

View file

@ -1,6 +1,6 @@
# Technique T0133.003: Awareness
* **Summary**:
* **Summary**: Measure current system state with respect to the effectiveness of influencing awareness.
* **Belongs to tactic stage**: TA12

View file

@ -1,6 +1,6 @@
# Technique T0133.004: Knowledge
* **Summary**:
* **Summary**: Measure current system state with respect to the effectiveness of influencing knowledge.
* **Belongs to tactic stage**: TA12

View file

@ -1,6 +1,6 @@
# Technique T0133.005: Action/attitude
* **Summary**:
* **Summary**: Measure current system state with respect to the effectiveness of influencing action/attitude.
* **Belongs to tactic stage**: TA12

View file

@ -40,7 +40,7 @@
<tr>
<td><a href="techniques/T0009.001.md">T0009.001</a></td>
<td>Utilize Academic/Pseudoscientific Justifications</td>
<td></td>
<td>Utilize Academic/Pseudoscientific Justifications</td>
<td>TA16</td>
</tr>
<tr>
@ -69,14 +69,14 @@
</tr>
<tr>
<td><a href="techniques/T0014.001.md">T0014.001</a></td>
<td>From bad actors</td>
<td></td>
<td>Raise funds from malign actors</td>
<td>Raising funds from malign actors may include contributions from foreign agents, cutouts or proxies, shell companies, dark money groups, etc. </td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0014.002.md">T0014.002</a></td>
<td>From ignorant agents</td>
<td></td>
<td>Raise funds from ignorant agents</td>
<td>Raising funds from ignorant agents may include scams, donations intended for one stated purpose but then used for another, etc. </td>
<td>TA15</td>
</tr>
<tr>
@ -100,7 +100,7 @@
<tr>
<td><a href="techniques/T0017.001.md">T0017.001</a></td>
<td>Conduct Crowdfunding Campaigns</td>
<td></td>
<td>An influence operation may Conduct Crowdfunding Campaigns on platforms such as GoFundMe, GiveSendGo, Tipeee, Patreon, etc.</td>
<td>TA10</td>
</tr>
<tr>
@ -124,7 +124,7 @@
<tr>
<td><a href="techniques/T0019.002.md">T0019.002</a></td>
<td>Hijack Hashtags</td>
<td></td>
<td>Hashtag hijacking occurs when users “[use] a trending hashtag to promote topics that are substantially different from its recent context” (VanDam and Tan, 2016) or “to promote ones own social media agenda” (Darius and Stephany, 2019).</td>
<td>TA06</td>
</tr>
<tr>
@ -141,14 +141,14 @@
</tr>
<tr>
<td><a href="techniques/T0022.001.md">T0022.001</a></td>
<td>Amplify Existing Conspiracy Theory Narrative</td>
<td></td>
<td>Amplify Existing Conspiracy Theory Narratives</td>
<td>An influence operation may amplify an existing conspiracy theory narrative that aligns with its incident or campaign goals. By amplifying existing conspiracy theory narratives, operators can leverage the power of the existing communities that support and propagate those theories without needing to expend resources creating new narratives or building momentum and buy in around new narratives. </td>
<td>TA14</td>
</tr>
<tr>
<td><a href="techniques/T0022.002.md">T0022.002</a></td>
<td>Develop Original Conspiracy Theory Narratives</td>
<td></td>
<td>While this requires more resources than amplifying existing conspiracy theory narratives, an influence operation may develop original conspiracy theory narratives in order to achieve greater control and alignment over the narrative and their campaign goals. Prominent examples include the USSR's Operation INFEKTION disinformation campaign run by the KGB in the 1980s to plant the idea that the United States had invented HIV/AIDS as part of a biological weapons research project at Fort Detrick, Maryland. More recently, Fort Detrick featured prominently in a new conspiracy theory narratives around the origins of the COVID-19 outbreak and pandemic. </td>
<td>TA14</td>
</tr>
<tr>
@ -202,13 +202,13 @@
<tr>
<td><a href="techniques/T0043.001.md">T0043.001</a></td>
<td>Use Encrypted Chat Apps</td>
<td></td>
<td>Examples include Signal, WhatsApp, Discord, Wire, etc.</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0043.002.md">T0043.002</a></td>
<td>Use Unencrypted Chats Apps</td>
<td></td>
<td>Examples include SMS, etc.</td>
<td>TA07</td>
</tr>
<tr>
@ -578,19 +578,19 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0084.002.md">T0084.002</a></td>
<td>Plagiarize Content</td>
<td></td>
<td>An influence operation may take content from other sources without proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources. </td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0084.003.md">T0084.003</a></td>
<td>Deceptively Labeled or Translated</td>
<td></td>
<td>An influence operation may take authentic content from other sources and add deceptive labels or deceptively translate the content into other langauges. </td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0084.004.md">T0084.004</a></td>
<td>Appropriate Content</td>
<td></td>
<td>An influence operation may take content from other sources with proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources. Examples include the appropriation of content from one inauthentic news site to another inauthentic news site or network in ways that align with the originators licensing or terms of service.</td>
<td>TA06</td>
</tr>
<tr>
@ -608,13 +608,13 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0085.002.md">T0085.002</a></td>
<td>Develop False or Altered Documents</td>
<td></td>
<td>Develop False or Altered Documents</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0085.003.md">T0085.003</a></td>
<td>Develop Inauthentic News Articles</td>
<td></td>
<td>An influence operation may develop false or misleading news articles aligned to their campaign goals or narratives. </td>
<td>TA06</td>
</tr>
<tr>
@ -637,14 +637,14 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
</tr>
<tr>
<td><a href="techniques/T0086.003.md">T0086.003</a></td>
<td>Deceptively Edit Image (Cheap fakes)</td>
<td>Deceptively Edit Images (Cheap fakes)</td>
<td>Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0086.004.md">T0086.004</a></td>
<td>Aggregate Information into Evidence Collages</td>
<td>image files that aggregate positive evidence (Joan Donovan)</td>
<td>Image files that aggregate positive evidence (Joan Donovan)</td>
<td>TA06</td>
</tr>
<tr>
@ -691,20 +691,20 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
</tr>
<tr>
<td><a href="techniques/T0089.001.md">T0089.001</a></td>
<td>Leak Authentic Documents</td>
<td></td>
<td>Obtain Authentic Documents</td>
<td>Procure authentic documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can be "leaked" during later stages in the operation.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0089.002.md">T0089.002</a></td>
<td>Leak False Documents</td>
<td></td>
<td>Create Inauthentic Documents</td>
<td>Create inauthentic documents intended to appear as if they are authentic non-public documents. These documents can be "leaked" during later stages in the operation.</td>
<td>TA06</td>
</tr>
<tr>
<td><a href="techniques/T0089.003.md">T0089.003</a></td>
<td>Leak Altered Documents</td>
<td>Obtain documents (eg by theft or leak), then alter and release, possibly among factual documents/sources.</td>
<td>Alter Authentic Documents</td>
<td>Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic can be "leaked" during later stages in the operation.</td>
<td>TA06</td>
</tr>
<tr>
@ -740,20 +740,20 @@ Amplifier bots promote operation content through reposts, shares, and likes to i
</tr>
<tr>
<td><a href="techniques/T0091.md">T0091</a></td>
<td>Recruit bad actors</td>
<td>Recruit malign actors</td>
<td>Operators recruit bad actors paying recruiting, or exerting control over individuals includes trolls, partisans, and contractors.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0091.001.md">T0091.001</a></td>
<td>Recruit Contractors</td>
<td></td>
<td>Operators recruit paid contractor to support the campaign.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0091.002.md">T0091.002</a></td>
<td>Recruit Partisans</td>
<td></td>
<td>Operators recruit partisans (ideologically-aligned individuals) to support the campaign.</td>
<td>TA15</td>
</tr>
<tr>
@ -777,19 +777,19 @@ Classic trolls refer to regular people who troll for personal reasons, such as a
</tr>
<tr>
<td><a href="techniques/T0092.002.md">T0092.002</a></td>
<td>Follow Trains</td>
<td></td>
<td>Use Follow Trains</td>
<td>A follow train is a group of people who follow each other on a social media platform, often as a way for an individual or campaign to grow its social media following. Follow trains may be a violation of platform Terms of Service. They are also known as follow-for-follow groups. </td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0092.003.md">T0092.003</a></td>
<td>Create Community or Sub-group</td>
<td></td>
<td>When there is not an existing community or sub-group that meets a campaign's goals, an influence operation may seek to create a community or sub-group. </td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0093.md">T0093</a></td>
<td>Acquire/ recruit Network</td>
<td>Acquire/Recruit Network</td>
<td>Operators acquire an existing network by paying, recruiting, or exerting control over the leaders of the existing network. </td>
<td>TA15</td>
</tr>
@ -803,8 +803,8 @@ Classic trolls refer to regular people who troll for personal reasons, such as a
</tr>
<tr>
<td><a href="techniques/T0093.002.md">T0093.002</a></td>
<td>Botnets</td>
<td></td>
<td>Acquire Botnets</td>
<td>A botnet is a group of bots that can function in coordination with each other. </td>
<td>TA15</td>
</tr>
<tr>
@ -816,12 +816,12 @@ Classic trolls refer to regular people who troll for personal reasons, such as a
<tr>
<td><a href="techniques/T0094.001.md">T0094.001</a></td>
<td>Identify susceptible targets in networks</td>
<td></td>
<td>When seeking to infiltrate an existing network, an influence operation may identify individuals and groups that might be susceptible to being co-opted or influenced.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0094.002.md">T0094.002</a></td>
<td>Utilize Butterfly Attack</td>
<td>Utilize Butterfly Attacks</td>
<td>Butterfly attacks occur when operators pretend to be members of a certain social group, usually a group that struggles for representation. An influence operation may mimic a group to insert controversial statements into the discourse, encourage the spread of operation content, or promote harassment among group members. Unlike astroturfing, butterfly attacks aim to infiltrate and discredit existing grassroots movements, organizations, and media campaigns. </td>
<td>TA15</td>
</tr>
@ -833,14 +833,14 @@ Classic trolls refer to regular people who troll for personal reasons, such as a
</tr>
<tr>
<td><a href="techniques/T0096.md">T0096</a></td>
<td>Leverage Content Farm</td>
<td>Leverage Content Farms</td>
<td>Using the services of large-scale content providers for creating and amplifying campaign artifacts at scale.</td>
<td>TA15</td>
</tr>
<tr>
<td><a href="techniques/T0096.001.md">T0096.001</a></td>
<td>Create a Content Farm</td>
<td></td>
<td>Create Content Farms</td>
<td>An influence operation may create an organization for creating and amplifying campaign artifacts at scale.</td>
<td>TA15</td>
</tr>
<tr>
@ -870,14 +870,13 @@ Classic trolls refer to regular people who troll for personal reasons, such as a
<tr>
<td><a href="techniques/T0098.001.md">T0098.001</a></td>
<td>Create Inauthentic News Sites</td>
<td></td>
<td>Create Inauthentic News Sites</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0098.002.md">T0098.002</a></td>
<td>Leverage Existing Inauthentic News Sites</td>
<td>An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities.
An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. </td>
<td>Leverage Existing Inauthentic News Sites</td>
<td>TA16</td>
</tr>
<tr>
@ -896,7 +895,7 @@ An influence operation may use a wide variety of cyber techniques to impersonate
<tr>
<td><a href="techniques/T0099.002.md">T0099.002</a></td>
<td>Spoof/parody account/site</td>
<td></td>
<td>An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. </td>
<td>TA16</td>
</tr>
<tr>
@ -911,19 +910,19 @@ An influence operation may use a wide variety of cyber techniques to impersonate
<tr>
<td><a href="techniques/T0100.001.md">T0100.001</a></td>
<td>Co-Opt Trusted Individuals</td>
<td></td>
<td>Co-Opt Trusted Individuals</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0100.002.md">T0100.002</a></td>
<td>Co-Opt Grassroots Groups</td>
<td></td>
<td>Co-Opt Grassroots Groups</td>
<td>TA16</td>
</tr>
<tr>
<td><a href="techniques/T0100.003.md">T0100.003</a></td>
<td>Co-opt Influencers</td>
<td></td>
<td>Co-opt Influencers</td>
<td>TA16</td>
</tr>
<tr>
@ -941,13 +940,13 @@ An influence operation may use a wide variety of cyber techniques to impersonate
<tr>
<td><a href="techniques/T0102.001.md">T0102.001</a></td>
<td>Use existing Echo Chambers/Filter Bubbles</td>
<td></td>
<td>Use existing Echo Chambers/Filter Bubbles</td>
<td>TA05</td>
</tr>
<tr>
<td><a href="techniques/T0102.002.md">T0102.002</a></td>
<td>Create Echo Chambers/Filter Bubbles</td>
<td></td>
<td>Create Echo Chambers/Filter Bubbles</td>
<td>TA05</td>
</tr>
<tr>
@ -984,19 +983,19 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0104.001.md">T0104.001</a></td>
<td>Mainstream Social Networks</td>
<td>Examples include Facebook, Twitter, LinkedIn, VK, </td>
<td>Examples include Facebook, Twitter, LinkedIn, etc.</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0104.002.md">T0104.002</a></td>
<td>Dating Apps</td>
<td></td>
<td>A video livestream refers to an online video broadcast capability that allows for real-time communication to closed or open networks. Examples include Facebook Live, Instagram, Youtube, Tik Tok, and Twitter. </td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0104.003.md">T0104.003</a></td>
<td>Private/Closed Social Networks</td>
<td></td>
<td>An audio livestream refers to an online audio broadcast capability that allows for real-time communication to closed or open networks. Examples include Twitter Spaces, </td>
<td>TA07</td>
</tr>
<tr>
@ -1086,19 +1085,19 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0111.001.md">T0111.001</a></td>
<td>TV</td>
<td></td>
<td>TV</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0111.002.md">T0111.002</a></td>
<td>Newspaper</td>
<td></td>
<td>Newspaper</td>
<td>TA07</td>
</tr>
<tr>
<td><a href="techniques/T0111.003.md">T0111.003</a></td>
<td>Radio</td>
<td></td>
<td>Radio</td>
<td>TA07</td>
</tr>
<tr>
@ -1122,7 +1121,7 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0114.001.md">T0114.001</a></td>
<td>Social media</td>
<td></td>
<td>Social Media</td>
<td>TA09</td>
</tr>
<tr>
@ -1146,7 +1145,7 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0115.002.md">T0115.002</a></td>
<td>Post Violative Content to Provoke Takedown and Backlash</td>
<td></td>
<td>Post Violative Content to Provoke Takedown and Backlash.</td>
<td>TA09</td>
</tr>
<tr>
@ -1188,19 +1187,19 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0119.001.md">T0119.001</a></td>
<td>Post Across Groups</td>
<td></td>
<td>An influence operation may post content across groups to spread narratives and content to new communities within the target audiences or to new target audiences. </td>
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0119.002.md">T0119.002</a></td>
<td>Post Across Platform</td>
<td></td>
<td>An influence operation may post content across platforms to spread narratives and content to new communities within the target audiences or to new target audiences. Posting across platforms can also remove opposition and context, helping the narrative spread with less opposition on the cross-posted platform. </td>
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0119.003.md">T0119.003</a></td>
<td>Post Across Disciplines</td>
<td></td>
<td>Post Across Disciplines</td>
<td>TA17</td>
</tr>
<tr>
@ -1212,13 +1211,13 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0120.001.md">T0120.001</a></td>
<td>Use Affiliate Marketing Programs</td>
<td></td>
<td>Use Affiliate Marketing Programs</td>
<td>TA17</td>
</tr>
<tr>
<td><a href="techniques/T0120.002.md">T0120.002</a></td>
<td>Use Contests and Prizes</td>
<td></td>
<td>Use Contests and Prizes</td>
<td>TA17</td>
</tr>
<tr>
@ -1296,7 +1295,7 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0124.003.md">T0124.003</a></td>
<td>Exploit Platform TOS/Content Moderation</td>
<td></td>
<td>Exploit Platform TOS/Content Moderation</td>
<td>TA18</td>
</tr>
<tr>
@ -1314,7 +1313,7 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0126.001.md">T0126.001</a></td>
<td>Call to action to attend </td>
<td></td>
<td>Call to action to attend an event</td>
<td>TA10</td>
</tr>
<tr>
@ -1332,13 +1331,13 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
<tr>
<td><a href="techniques/T0127.001.md">T0127.001</a></td>
<td>Conduct Physical Violence</td>
<td></td>
<td>An influence operation may directly Conduct Physical Violence to achieve campaign goals. </td>
<td>TA10</td>
</tr>
<tr>
<td><a href="techniques/T0127.002.md">T0127.002</a></td>
<td>Encourage Physical Violence</td>
<td></td>
<td>An influence operation may Encourage others to engage in Physical Violence to achieve campaign goals. </td>
<td>TA10</td>
</tr>
<tr>
@ -1409,8 +1408,8 @@ A 2019 report by Michael Golebiewski identifies five types of data voids. (1)
</tr>
<tr>
<td><a href="techniques/T0129.005.md">T0129.005</a></td>
<td>Coordinate on encrypted/closed networks</td>
<td>Coordinate on encrypted/ closed networks</td>
<td></td>
<td>TA11</td>
</tr>
<tr>
@ -1465,19 +1464,19 @@ Influence operations may use a variety of techniques to mask the location of the
<tr>
<td><a href="techniques/T0130.003.md">T0130.003</a></td>
<td>Use Shell Organizations</td>
<td></td>
<td>Use Shell Organizations to conceal sponsorship.</td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0130.004.md">T0130.004</a></td>
<td>Use Cryptocurrency</td>
<td></td>
<td>Use Cryptocurrency to conceal sponsorship. Examples include Bitcoin, Monero, and Etherium. </td>
<td>TA11</td>
</tr>
<tr>
<td><a href="techniques/T0130.005.md">T0130.005</a></td>
<td>Obfuscate Payment</td>
<td></td>
<td>Obfuscate Payment</td>
<td>TA11</td>
</tr>
<tr>
@ -1495,7 +1494,7 @@ Influence operations may use a variety of techniques to mask the location of the
<tr>
<td><a href="techniques/T0131.002.md">T0131.002</a></td>
<td>Post Borderline Content</td>
<td></td>
<td>Post Borderline Content</td>
<td>TA11</td>
</tr>
<tr>
@ -1507,19 +1506,19 @@ Influence operations may use a variety of techniques to mask the location of the
<tr>
<td><a href="techniques/T0132.001.md">T0132.001</a></td>
<td>People Focused</td>
<td></td>
<td>Measure the performance individuals in achieving campaign goals</td>
<td>TA12</td>
</tr>
<tr>
<td><a href="techniques/T0132.002.md">T0132.002</a></td>
<td>Content Focused</td>
<td></td>
<td>Measure the performance of campaign content</td>
<td>TA12</td>
</tr>
<tr>
<td><a href="techniques/T0132.003.md">T0132.003</a></td>
<td>View Focused</td>
<td></td>
<td>View Focused</td>
<td>TA12</td>
</tr>
<tr>
@ -1537,25 +1536,25 @@ Influence operations may use a variety of techniques to mask the location of the
<tr>
<td><a href="techniques/T0133.002.md">T0133.002</a></td>
<td>Content</td>
<td></td>
<td>Measure current system state with respect to the effectiveness of campaign content. </td>
<td>TA12</td>
</tr>
<tr>
<td><a href="techniques/T0133.003.md">T0133.003</a></td>
<td>Awareness</td>
<td></td>
<td>Measure current system state with respect to the effectiveness of influencing awareness. </td>
<td>TA12</td>
</tr>
<tr>
<td><a href="techniques/T0133.004.md">T0133.004</a></td>
<td>Knowledge</td>
<td></td>
<td>Measure current system state with respect to the effectiveness of influencing knowledge. </td>
<td>TA12</td>
</tr>
<tr>
<td><a href="techniques/T0133.005.md">T0133.005</a></td>
<td>Action/attitude</td>
<td></td>
<td>Measure current system state with respect to the effectiveness of influencing action/attitude. </td>
<td>TA12</td>
</tr>
<tr>