DISARMframeworks/DISARM_MASTER_DATA/tactics.csv
Sara-Jayne Terp 1bc8d88b63 moved to datasets as CSVs
Changed from data held in excelfiles to data held in CSV files.  This gives us a better view of what's changed in the datasets when we push them to git.
2022-08-25 09:50:52 -04:00

6.0 KiB
Raw Permalink Blame History

1disarm_idnamename_DEphase_idranksummarysummary_DEchanges from v0.1longname
2TA01Plan StrategyP011Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives.no changeTA01 - Plan Strategy
3TA02Plan ObjectivesP012Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: - Each desired effect should link directly to one or more objectives - The effect should be measurable - The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.no changeTA02 - Plan Objectives
4TA05MicrotargetP028Target very specific populations of peopleno changeTA05 - Microtarget
5TA06Develop ContentP025Create or acquire text, images, and other contentno changeTA06 - Develop Content
6TA07Select Channels and AffordancesP029Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operations ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content.no changeTA07 - Select Channels and Affordances
7TA08Conduct Pump PrimingP0310Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. no changeTA08 - Conduct Pump Priming
8TA09Deliver ContentP0311Release content to general public or larger populationno changeTA09 - Deliver Content
9TA10Drive Offline ActivityP0314Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. no changeTA10 - Drive Offline Activity
10TA11Persist in the Information EnvironmentP0315Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign.no changeTA11 - Persist in the Information Environment
11TA12Assess EffectivenessP0416Assess effectiveness of action, for use in future plans no changeTA12 - Assess Effectiveness
12TA13Target Audience AnalysisP013Identifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. no changeTA13 - Target Audience Analysis
13TA14Develop NarrativesP024The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a ""whole of society"" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline.newTA14 - Develop Narratives
14TA15Establish Social AssetsP026Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.newTA15 - Establish Social Assets
15TA16Establish LegitimacyP027Establish assets that create trustnewTA16 - Establish Legitimacy
16TA17Maximize ExposureP0312Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting.newTA17 - Maximize Exposure
17TA18Drive Online HarmsP0313Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. newTA18 - Drive Online Harms