DISARMframeworks/DISARM_MASTER_DATA/detections.csv
Sara-Jayne Terp 1bc8d88b63 moved to datasets as CSVs
Changed from data held in excelfiles to data held in CSV files.  This gives us a better view of what's changed in the datasets when we push them to git.
2022-08-25 09:50:52 -04:00

22 KiB
Raw Permalink Blame History

1disarm_idnamemetatechniquesummaryhow_foundreferencesincidentstacticresponsetypenoteslongname
2F00001Analyse aborted / failed campaignsExamine failed campaigns. How did they fail? Can we create useful activities that increase these failures? 2019-11-workshopTA01 Strategic PlanningD01F00001 - Analyse aborted / failed campaigns
3F00002Analyse viral fizzleWe have no idea what this means. Is it something to do with the way a viral story spreads? 2019-11-workshopTA01 Strategic PlanningD01F00002 - Analyse viral fizzle
4F00003Exploit counter-intelligence vs bad actors2019-11-workshopTA01 Strategic PlanningD01F00003 - Exploit counter-intelligence vs bad actors
5F00004Recruit like-minded converts "people who used to be in-group" 2019-11-workshopTA01 Strategic PlanningD01F00004 - Recruit like-minded converts "people who used to be in-group"
6F00005SWOT Analysis of Cognition in Various GroupsStrengths, Weaknesses, Opportunities, Threats analysis of groups and audience segments. 2019-11-workshopTA01 Strategic PlanningD01F00005 - SWOT Analysis of Cognition in Various Groups
7F00006SWOT analysis of tech platforms2019-11-workshopTA01 Strategic PlanningD01F00006 - SWOT analysis of tech platforms
8F00007Monitor account level activity in social networks2019-11-workshopTA02 Objective PlanningD01F00007 - Monitor account level activity in social networks
9F00008Detect abnormal amplification2019-11-workshopTA15 Establish Social AssetsD01F00008 - Detect abnormal amplification
10F00009Detect abnormal events2019-11-workshopTA15 Establish Social AssetsD01F00009 - Detect abnormal events
11F00010Detect abnormal groups2019-11-workshopTA15 Establish Social AssetsD01F00010 - Detect abnormal groups
12F00011Detect abnormal pages2019-11-workshopTA15 Establish Social AssetsD01F00011 - Detect abnormal pages
13F00012Detect abnormal profiles, e.g. prolific pages/ groups/ people2019-11-workshopTA15 Establish Social AssetsD01F00012 - Detect abnormal profiles, e.g. prolific pages/ groups/ people
14F00013Identify fake news sites2019-11-workshopTA15 Establish Social AssetsD01F00013 - Identify fake news sites
15F00014Trace connectionsfor e.g. fake news sites2019-11-workshopTA15 Establish Social AssetsD01F00014 - Trace connections
16F00015Detect anomalies in membership growth patternsI include Fake Experts as they may use funding campaigns such as Patreon to fund their operations and so these should be watched.2019-11-workshopTA15 Establish Social AssetsD01F00015 - Detect anomalies in membership growth patterns
17F00016Identify fence-sittersNote: In each case, depending on the platform there may be a way to identify a fence-sitter. For example, online polls may have a neutral option or a "somewhat this-or-that" option, and may reveal who voted for that to all visitors. This information could be of use to data analysts. In TA08-11, the engagement level of victims could be identified to detect and respond to increasing engagement.2019-11-workshopTA15 Establish Social AssetsD01F00016 - Identify fence-sitters
18F00017Measure emotional valence2019-11-workshopTA15 Establish Social AssetsD01F00017 - Measure emotional valence
19F00018Follow the moneytrack funding sources2019-11-workshopTA15 Establish Social AssetsD01F00018 - Follow the money
20F00019Activity resurgence detection (alarm when dormant accounts become activated)2019-11-workshopTA15 Establish Social AssetsD01F00019 - Activity resurgence detection (alarm when dormant accounts become activated)
21F00020Detect anomalous activity2019-11-workshopTA15 Establish Social AssetsD01F00020 - Detect anomalous activity
22F00021AI/ML automated early detection of campaign planning2019-11-workshopTA15 Establish Social AssetsD01Automated Detection of CampaignF00021 - AI/ML automated early detection of campaign planning
23F00022Digital authority - regulating body (united states)2019-11-workshopTA15 Establish Social AssetsD01F00022 - Digital authority - regulating body (united states)
24F00023Periodic verification (counter to hijack legitimate account)2019-11-workshopTA15 Establish Social AssetsD01F00023 - Periodic verification (counter to hijack legitimate account)
25F00024Teach civics to kids/ adults/ seniors2019-11-workshopTA15 Establish Social AssetsD01F00024 - Teach civics to kids/ adults/ seniors
26F00025Boots-on-the-ground early narrative detection2019-11-workshopTA05 MicrotargetingD01F00025 - Boots-on-the-ground early narrative detection
27F00026Language anomoly detection2019-11-workshopTA05 MicrotargetingD01F00026 - Language anomoly detection
28F00027Unlikely correlation of sentiment on same topics2019-11-workshopTA05 MicrotargetingD01F00027 - Unlikely correlation of sentiment on same topics
29F00028Associate a public key signature with government documents2019-11-workshopTA06 Develop ContentD01F00028 - Associate a public key signature with government documents
30F00029Detect proto narratives, i.e. RT, Sputnik2019-11-workshopTA06 Develop ContentD01F00029 - Detect proto narratives, i.e. RT, Sputnik
31F00030Early detection and warning - reporting of suspect content2019-11-workshopTA06 Develop ContentD01F00030 - Early detection and warning - reporting of suspect content
32F00031Educate on how to identify information pollutionStrategic planning included as innoculating population has strategic value.2019-11-workshopTA06 Develop ContentD01F00031 - Educate on how to identify information pollution
33F00032Educate on how to identify to pollutionDUPLICATE - DELETE 2019-11-workshopTA06 Develop ContentD01F00032 - Educate on how to identify to pollution
34F00033Fake websites: add transparency on business model2019-11-workshopTA06 Develop ContentD01F00033 - Fake websites: add transparency on business model
35F00034Flag the information spaces so people know about active flooding effort2019-11-workshopTA06 Develop ContentD01F00034 - Flag the information spaces so people know about active flooding effort
36F00035Identify repeated narrative DNA2019-11-workshopTA06 Develop ContentD01F00035 - Identify repeated narrative DNA
37F00036Looking for AB testing in unregulated channels2019-11-workshopTA06 Develop ContentD01F00036 - Looking for AB testing in unregulated channels
38F00037News content provenance certification. Original Comment: Shortcomings: intentional falsehood. Doesn't solve accuracy. Can't be mandatory. Technique should be in terms of "strategic innoculation", raising the standards of what people expect in terms of evidence when consuming news.2019-11-workshopTA06 Develop ContentD01F00037 - News content provenance certification.
39F00038Social capital as attack vectorUnsure I understood the original intention or what it applied to. Therefore the techniques listed (10, 39, 43, 57, 61) are under my interpretation - which is that we want to track ignorant agents who fall into the enemy's trap and show a cost to financing/reposting/helping the adversary via public shaming or other means.2019-11-workshopTA06 Develop ContentD01F00038 - Social capital as attack vector
40F00039standards to track image/ video deep fakes - industry2019-11-workshopTA06 Develop ContentD01F00039 - standards to track image/ video deep fakes - industry
41F00040Unalterable metadata signature on origins of image and provenance2019-11-workshopTA06 Develop ContentD01F00040 - Unalterable metadata signature on origins of image and provenance
42F00041Bias detectionNot technically left of boom2019-11-workshopTA07 Channel SelectionD01F00041 - Bias detection
43F00042Categorize polls by intentUse T00029, but against the creators2019-11-workshopTA07 Channel SelectionD01F00042 - Categorize polls by intent
44F00043Monitor for creation of fake known personasPlatform companies and some information security companies (e.g. ZeroFox) do this. 2019-11-workshopTA07 Channel SelectionD01F00043 - Monitor for creation of fake known personas
45F00044Forensic analysisCan be used in all phases for all techniques.2019-11-workshopTA08 Pump PrimingD01F00044 - Forensic analysis
46F00045Forensic linguistic analysisCan be used in all phases for all techniques.2019-11-workshopTA08 Pump PrimingD01F00045 - Forensic linguistic analysis
47F00046Pump priming analytics2019-11-workshopTA08 Pump PrimingD01F00046 - Pump priming analytics
48F00047trace involved parties2019-11-workshopTA08 Pump PrimingD01F00047 - trace involved parties
49F00048Trace known operations and connection2019-11-workshopTA08 Pump PrimingD01F00048 - Trace known operations and connection
50F00049trace money2019-11-workshopTA08 Pump PrimingD01F00049 - trace money
51F00050Web cache analytics2019-11-workshopTA08 Pump PrimingD01F00050 - Web cache analytics
52F00051Challenge expertise2019-11-workshopTA09 ExposureD01F00051 - Challenge expertise
53F00052Discover sponsorsDiscovering the sponsors behind a campaign, narrative, bot, a set of accounts, or a social media comment, or anything else is useful.2019-11-workshopTA09 ExposureD01F00052 - Discover sponsors
54F00053Government rumour control office (what can we learn?)2019-11-workshopTA09 ExposureD01F00053 - Government rumour control office (what can we learn?)
55F00054Restrict people who can @ you on social networks2019-11-workshopTA09 ExposureD01F00054 - Restrict people who can @ you on social networks
56F00055Verify credentials2019-11-workshopTA09 ExposureD01F00055 - Verify credentials
57F00056Verify organisation legitimacy2019-11-workshopTA09 ExposureD01F00056 - Verify organisation legitimacy
58F00057Verify personal credentials of experts2019-11-workshopTA09 ExposureD01F00057 - Verify personal credentials of experts
59F00058Deplatform (cancel culture)*Deplatform People: This technique needs to be a bit more specific to distinguish it from "account removal" or DDOS and other techniques that get more specific when applied to content. For example, other ways of deplatforming people include attacking their sources of funds, their allies, their followers, etc.2019-11-workshopTA10 Go PhysicalD01F00058 - Deplatform (cancel culture)
60F00059Identify susceptible demographicsAll techniques provide or are susceptible to being countered by, or leveraged for, knowledge about user demographics.2019-11-workshopTA10 Go PhysicalD01F00059 - Identify susceptible demographics
61F00060Identify susceptible influencersI assume this was a transcript error. Otherwise, "Identify Susceptible Influences" as in the various methods of influences that may work against a victim could also be a technique. Nope, wasn't a transcript error: original note says influencers, as in find people of influence that might be targetted. 2019-11-workshopTA10 Go PhysicalD01F00060 - Identify susceptible influencers
62F00061Microtargeting2019-11-workshopTA10 Go PhysicalD01F00061 - Microtargeting
63F00062Detect when Dormant account turns active2019-11-workshopTA11 PersistenceD01F00062 - Detect when Dormant account turns active
64F00063Linguistic change analysis2019-11-workshopTA11 PersistenceD01F00063 - Linguistic change analysis
65F00064Monitor reports of account takeover2019-11-workshopTA11 PersistenceD01F00064 - Monitor reports of account takeover
66F00065Sentiment change analysis2019-11-workshopTA11 PersistenceD01F00065 - Sentiment change analysis
67F00066Use language errors, time to respond to account bans and lawsuits, to indicate capabilities2019-11-workshopTA11 PersistenceD01F00066 - Use language errors, time to respond to account bans and lawsuits, to indicate capabilities
68F00067Data forensics2019-11-searchI00029,I00045D01F00067 - Data forensics
69F00068Resonance analysisa developing methodology for identifying statistical differences in how social groups use language and quantifying how common those statistical differences are within a larger population. In essence, it hypothesizes how much affinity might exist for a specific group within a general population, based on the language its members employ2019-11-searchRand2237D01F00068 - Resonance analysis
70F00069Track Russian media and develop analytic methods.To effectively counter Russian propaganda, it will be critical to track Russian influence efforts. The information requirements are varied and include the following: • Identify fake-news stories and their sources. • Understand narrative themes and content that pervade various Russian media sources. • Understand the broader Russian strategy that underlies tactical propaganda messaging.2019-11-searchRand2237D01F00069 - Track Russian media and develop analytic methods.
71F00070Full spectrum analytics2019-11-workshopALLD01F00070 - Full spectrum analytics
72F00071Network analysis Identify/cultivate/support influencersLocal influencers detected via Twitter networks are likely local influencers in other online and off-line channels as well. In addition, the content and themes gleaned from Russia and Russia-supporting populations, as well as anti-Russia activists, likely swirl in other online and off-line mediums as well.2019-11-searchRand2237D01F00071 - Network analysis Identify/cultivate/support influencers
73F00072network analysis to identify central users in the pro-Russia activist community.It is possible that some of these are bots or trolls and could be flagged for suspension for violating Twitters terms of service.2019-11-searchRand2237D01F00072 - network analysis to identify central users in the pro-Russia activist community.
74F00073collect intel/recon on black/covert content creators/manipulatorsPlayers at the level of covert attribution, referred to as “black” in the grayscale of deniability, produce content on user-generated media, such as YouTube, but also add fear-mongering commentary to and amplify content produced by others and supply exploitable content to data dump websites. These activities are conducted by a network of trolls, bots, honeypots, and hackers. 2019-11-searchRand2237D01F00073 - collect intel/recon on black/covert content creators/manipulators
75F00074identify relevant fence-sitter communitiesbrand ambassador programs could be used with influencers across a variety of social media channels. It could also target other prominent experts, such as academics, business leaders, and other potentially prominent people. Authorities must ultimately take care in implementing such a program given the risk that contact with U.S. or NATO authorities might damage influencer reputations. Engagements must consequently be made with care, and, if possible, government interlocutors should work through local NGOs.2019-11-searchRand2237D01F00074 - identify relevant fence-sitter communities
76F00075leverage open-source informationsignificant amounts of quality open-source information are now available and should be leveraged to build products and analysis prior to problem prioritization in the areas of observation, attribution, and intent. Successfully distinguishing the gray zone campaign signal through the global noise requires action through the entirety of the national security community. Policy, process, and tools must all adapt and evolve to detect, discern, and act upon a new type of signal2019-11-searchDalton19D01F00075 - leverage open-source information
77F00076Monitor/collect audience engagement data connected to “useful idiots”Target audience connected to "useful idiots rather than the specific profiles because - The active presence of such sources complicates targeting of Russian propaganda, given that it is often difficult to discriminate between authentic views and opinions on the internet and those disseminated by the Russian state. 2019-11-searchRand2237D01F00076 - Monitor/collect audience engagement data connected to “useful idiots”
78F00077Model for bot account behaviorBot account: action based, people. Unsure which DISARM techniques.2019-11-workshopTA15 - Establish Social AssetsD01F00077 - Model for bot account behavior
79F00078Monitor account level activity in social networksAll techniques benefit from careful analysis and monitoring of activities on social network.2019-11-workshopTA15 - Establish Social AssetsD01F00078 - Monitor account level activity in social networks
80F00079Network anomaly detection2019-11-workshopTA05 MicrotargetingD01F00079 - Network anomaly detection
81F00080Hack the polls/ content yourselfTwo wrongs don't make a right? But if you hack your own polls, you do learn how it could be done, and learn what to look for2019-11-workshopTA07 Channel SelectionD01F00080 - Hack the polls/ content yourself
82F00081Need way for end user to report operations2019-11-workshopTA09 ExposureD01F00081 - Need way for end user to report operations
83F00082Control the US "slang" translation boards2019-11-workshopTA11 PersistenceD03F00082 - Control the US "slang" translation boards
84F00083Build and own meme generator, then track and watermark contents2019-11-workshopTA11 PersistenceD05F00083 - Build and own meme generator, then track and watermark contents
85F00084Track individual bad actors2019-11-workshopTA15 - Establish Social AssetsD01F00084 - Track individual bad actors
86F00085detection of a weak signal through global noiseGray zone threats are challenging given that warning requires detection of a weak signal through global noise and across threat vectors and regional boundaries.Three interconnected gray zone elements characterize the nature of the activity: Temporality: The nature of gray zone threats truly requires a “big picture view” over long timescales and across regions and functional topics. Attribution: requiring an “almost certain” or “nearly certain analytic assessment before acting costs time and analytic effort Intent: judgement of adversarial intent to conduct gray zone activity. Indeed, the purpose of countering gray zone threats is to deter adversaries from fulfilling their intent to act. While attribution is one piece of the puzzle, closing the space around intent often means synthesizing multiple relevant indicators and warnings, including the states geopolitical ambitions, military ties, trade and investment, level of corruption, and media landscape, among others.2019-11-searchDalton19F00085 - detection of a weak signal through global noise
87F00086Outpace Competitor Intelligence CapabilitiesDevelop an intelligence-based understanding of foreign actors motivations, psychologies, and societal and geopolitical contexts. Leverage artificial intelligence to identify patterns and infer competitors intent2019-11-searchHicks19TA02 Objective planningD01F00086 - Outpace Competitor Intelligence Capabilities
88F00087Improve Indications and WarningUnited States has not adequately adapted its information indicators and thresholds for warning policymakers to account for gray zone tactics. Competitors have undertaken a marked shift to slow-burn, deceptive, non-military, and indirect challenges to U.S. interests. Relative to traditional security indicators and warnings, these are more numerous and harder to detect and make it difficult for analysts to infer intent.2019-11-searchHicks19D01F00087 - Improve Indications and Warning
89F00088Revitalize an “active measures working group,”Recognize campaigns from weak signals, including rivals intent, capability, impact, interactive effects, and impact on U.S. interests... focus on adversarial covert action aspects of campaigning.2019-11-searchDalton19D01F00088 - Revitalize an “active measures working group,”
90F00089target/name/flag "grey zone" website content"Gray zone" is second level of content producers and circulators, composed of outlets with uncertain attribution. This category covers conspiracy websites, far-right or far-left websites, news aggregators, and data dump websites2019-11-searchRand2237TA15 Establish Social AssetsD01F00089 - target/name/flag "grey zone" website content
91F00090Match Punitive Tools with Third-Party InducementsBring private sector and civil society into accord on U.S. interests2019-11-searchHicks19TA01 Strategic PlanningD01F00090 - Match Punitive Tools with Third-Party Inducements
92F00091Partner to develop analytic methods & toolsThis might include working with relevant technology firms to ensure that contracted analytic support is available. Contracted support is reportedly valuable because technology to monitor social media data is continually evolving, and such firms can provide the expertise to help identify and analyze trends, and they can more effectively stay abreast of the changing systems and develop new models as they are required2019-11-searchRand2237TA01 Strategic PlanningD01F00091 - Partner to develop analytic methods & tools
93F00092daylightWarn social media companies about an ongoing campaign (e.g. antivax sites). Anyone with datasets or data summaries can help with this2019-11-searchI00002TA09 ExposureD01F00092 - daylight
94F00093S4d detection and re-allocation approachesM004 - frictionS4D is a way to separate out different speakers in text, audio. 2019-11-workshopTA15 - Establish Social AssetsD01F00093 - S4d detection and re-allocation approaches
95F00094Registries alert when large batches of newsy URLs get registered togetherM003 - daylightgrugqTA07 Channel SelectionD01F00094 - Registries alert when large batches of newsy URLs get registered together
96F00095Fact checkingProcess suspicious artifacts, narratives, and incidentsSJTA09 ExposureD01F00095 - Fact checking