DISARMframeworks/CODE/DISARM Merged (Internal) - DISARM Framework Merged.csv
Sara-Jayne Terp 82053a2221 code update
2022-06-30 21:36:27 +01:00

85 KiB
Raw Blame History

1DISARM PhaseDISARM TacticDISARM TechniqueDISARM SubtechniqueDescriptionDISARM IDFeedback from EEASAction to DoAction TakenWhere did it come from?Where from more info
21Plann/an/an/aEnvision the desired outcome. Lay out effective ways of achieving it. Communicate the vision, intent, and decisions, focusing on expected results.P01AMITT
336Preparen/an/an/aActivities conducted before execution to improve the ability to conduct the action. Examples include: development of the ecosystem needed to support the action: people, network, channels, content etc.P02
4126Executen/an/an/aRun the action, from initial exposure to wrap-up and/or maintaining presence etc.P03
5263Assessn/an/an/aAssess effectiveness of action, for use in future plans P04
67PlanPlan ObjectivesDismissDiscredit Credible SourcesPlan to delegitimize the media landscape and degrade public trust in reporting, by discrediting credible sources. This makes it easier to promote influence operation content.ST0001AMITTT0067 Plan to Discredit Credible Sources
716PlanTarget Audience AnalysisMap Target Audience Information EnvironmentMonitor Social Media AnalyticsAn influence operation may use social media analytics to determine which factors will increase the operation contents exposure to its target audience on social media platforms, including views, interactions, and sentiment relating to topics and content types. The social media platform itself or a third-party tool may collect the metrics. ST0002SPICE
817PlanTarget Audience AnalysisMap Target Audience Information EnvironmentEvaluate Media SurveysAn influence operation may evaluate its own or third-party media surveys to determine what type of content appeals to its target audience. Media surveys may provide insight into an audiences political views, social class, general interests, or other indicators used to tailor operation messaging to its target audience.ST0003SPICE
918PlanTarget Audience AnalysisMap Target Audience Information EnvironmentIdentify Trending Topics/HashtagsAn influence operation may identify trending hashtags on social media platforms for later use in boosting operation content. A hashtag40 refers to a word or phrase preceded by the hash symbol (#) on social media used to identify messages and posts relating to a specific topic. All public posts that use the same hashtag are aggregated onto a centralized page dedicated to the word or phrase and sorted either chronologically or by popularity. ST0004SPICE
1019PlanTarget Audience AnalysisMap Target Audience Information EnvironmentConduct Web Traffic AnalysisAn influence operation may conduct web traffic analysis to determine which search engines, keywords, websites, and advertisements gain the most traction with its target audience.ST0005SPICE
1120PlanTarget Audience AnalysisMap Target Audience Information EnvironmentAssess Degree/Type of Media AccessAn influence operation may survey a target audiences Internet availability and degree of media freedom to determine which target audience members will have access to operation content and on which platforms. An operation may face more difficulty targeting an information environment with heavy restrictions and media control than an environment with independent media, freedom of speech and of the press, and individual liberties. ST0006SPICE
1222PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesFind Echo ChambersFind or plan to create areas (social media groups, search term groups, hashtag groups etc) where individuals only engage with people they agree with. ST0007AMITT
1323PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesIdentify Data VoidsA data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. A 2019 report by Michael Golebiewski identifies five types of data voids. (1) “Breaking news” data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a “strategic new terms” data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on “outdated terms” that have decreased in popularity, capitalizing on most search engines preferences for recency. (4) “Fragmented concepts” data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use “problematic queries” that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term. ST0008SPICE
1424PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesIdentify Existing PrejudicesAn influence operation may exploit existing racial, religious, demographic, or social prejudices to further polarize its target audience from the rest of the public.ST0009SPICE
1525PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesIdentify Existing FissuresAn influence operation may identify existing fissures to pit target populations against one another or facilitate a “divide-and-conquer" approach to tailor operation narratives along the divides.ST0010
1626PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesIdentify Existing Conspiracy Narratives/SuspicionsAn influence operation may assess preexisting conspiracy theories or suspicions in a population to identify existing narratives that support operational objectives. ST0011SPICE
1727PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesIdentify Wedge IssuesA wedge issue is a divisive political issue, usually concerning a social phenomenon, that divides individuals along a defined line. An influence operation may exploit wedge issues by intentionally polarizing the public along the wedge issue line and encouraging opposition between factions.ST0012SPICE
1828PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesIdentify Target Audience AdversariesAn influence operation may identify or create a real or imaginary adversary to center operation narratives against. A real adversary may include certain politicians or political parties while imaginary adversaries may include falsified “deep state”62 actors that, according to conspiracies, run the state behind public view. ST0013SPICE
1929PlanTarget Audience AnalysisIdentify Social and Technical VulnerabilitiesIdentify Media System VulnerabilitiesAn influence operation may exploit existing weaknesses in a targets media system. These weaknesses may include existing biases among media agencies, vulnerability to false news agencies on social media, or existing distrust of traditional media sources. An existing distrust among the public in the media systems credibility holds high potential for exploitation by an influence operation when establishing alternative news agencies to spread operation content. ST0014SPICE
2031PlanTarget Audience AnalysisSegment AudiencesGeographic SegmentationAn influence operation may target populations in a specific geographic location, such as a region, state, or city. An influence operation may use geographic segmentation to Create Localized Content (see: Establish Legitimacy). ST0015SPICE
2132PlanTarget Audience AnalysisSegment AudiencesDemographic SegmentationAn influence operation may target populations based on demographic segmentation, including age, gender, and income. Demographic segmentation may be useful for influence operations aiming to change state policies that affect a specific population sector. For example, an influence operation attempting to influence Medicare funding in the United States would likely target U.S. voters over 65 years of age. ST0016SPICE
2233PlanTarget Audience AnalysisSegment AudiencesEconomic SegmentationAn influence operation may target populations based on their income bracket, wealth, or other financial or economic division. ST0017SPICE
2334PlanTarget Audience AnalysisSegment AudiencesPsychographic SegmentationAn influence operation may target populations based on psychographic segmentation, which uses audience values and decision-making processes. An operation may individually gather psychographic data with its own surveys or collection tools or externally purchase data from social media companies or online surveys, such as personality quizzes. ST0018SPICE
2435PlanTarget Audience AnalysisSegment AudiencesPolitical SegmentationAn influence operation may target populations based on their political affiliations, especially when aiming to manipulate voting or change policy.ST0019SPICE
2542PrepareDevelop NarrativesLeverage Conspiracy Theory NarrativesAmplify Existing Conspiracy Theory NarrativeST0020
2643PrepareDevelop NarrativesLeverage Conspiracy Theory NarrativesDevelop Original Conspiracy Theory NarrativesST0021
2749PrepareDevelop ContentReuse Existing ContentUse CopypastaCopypasta refers to a piece of text that has been copied and pasted multiple times across various online platforms. A copypastas final form may differ from its original source text as users add, delete, or otherwise edit the content as they repost the text. ST0022
2850PrepareDevelop ContentReuse Existing ContentPlagiarize ContentST0023
2951PrepareDevelop ContentReuse Existing ContentDeceptively Labeled or TranslatedST0024
3052PrepareDevelop ContentReuse Existing ContentAppropriate ContentST0025
3154PrepareDevelop ContentDevelop Text-based ContentDevelop AI-Generated TextAI-generated texts refers to synthetic text composed by computers using text-generating AI technology. Autonomous generation refers to content created by a bot without human input, also known as bot-created content generation. Autonomous generation represents the next step in automation after language generation and may lead to automated journalism. An influence operation may use read fakes or autonomous generation to quickly develop and distribute content to the target audience.ST0026
3255PrepareDevelop ContentDevelop Text-based ContentDevelop False or Altered DocumentsST0027
3356PrepareDevelop ContentDevelop Text-based ContentDevelop Inauthentic News ArticlesST0028
3458PrepareDevelop ContentDevelop Image-based ContentDevelop MemesMemes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.ST0029T0021 Develop Memes (AMITT)
3559PrepareDevelop ContentDevelop Image-based ContentDevelop AI-Generated Images (Deepfakes)Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individuals face, body, voice, and physical gestures.ST0030
3660PrepareDevelop ContentDevelop Image-based ContentDeceptively Edit Image (Cheap fakes)Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.ST0031
3761PrepareDevelop ContentDevelop Image-based ContentAggregate Information into Evidence Collagesimage files that aggregate positive evidence (Joan Donovan)ST0032
3863PrepareDevelop ContentDevelop Video-based ContentDevelop AI-Generated Videos (Deepfakes)Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individuals face, body, voice, and physical gestures.ST0033
3964PrepareDevelop ContentDevelop Video-based ContentDeceptively Edit Video (Cheap fakes)Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.ST0034
4066PrepareDevelop ContentDevelop Audio-based ContentDevelop AI-Generated Audio (Deepfakes)Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individuals face, body, voice, and physical gestures.ST0035
4167PrepareDevelop ContentDevelop Audio-based ContentDeceptively Edit Audio (Cheap fakes)Cheap fakes utilize less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.ST0036
4269PrepareDevelop ContentGenerate information pollutionCreate fake researchCreate fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxxST0037T0026 Create fake research (AMITT)
4370PrepareDevelop ContentGenerate information pollutionHijack HashtagsST0038
4472PrepareDevelop ContentDistort factsReframe ContextReframing context refers to removing an event from its surrounding context to distort its intended meaning. Rather than deny that an event occurred, reframing context frames an event in a manner that may lead the target audience to draw a different conclusion about its intentions. ST0039
4573PrepareDevelop ContentDistort factsEdit Open-Source ContentAn influence operation may edit open-source content, such as collaborative blogs or encyclopedias, to promote its narratives on outlets with existing credibility and audiences. Editing open-source content may allow an operation to post content on platforms without dedicating resources to the creation and maintenance of its own assets. ST0040
4676PrepareDevelop ContentObtain Private DocumentsLeak Authentic DocumentsST0041
4777PrepareDevelop ContentObtain Private DocumentsLeak False DocumentsST0042
4878PrepareDevelop ContentObtain Private DocumentsLeak Altered DocumentsObtain documents (eg by theft or leak), then alter and release, possibly among factual documents/sources.ST0043T0025 Leak altered documents (AMITT)
4981PrepareEstablish Social AssetsCreate Inauthentic AccountsCreate Anonymous AccountsAnonymous accounts or anonymous users refer to users that access network resources without providing a username or password. An influence operation may use anonymous accounts to spread content without direct attribution to the operation. ST0044SPICE
5082PrepareEstablish Social AssetsCreate Inauthentic AccountsCreate Cyborg AccountsCyborg accounts refer to partly manned, partly automated social media accounts. Cyborg accounts primarily act as bots, but a human operator periodically takes control of the account to engage with real social media users by responding to comments and posting original content. Influence operations may use cyborg accounts to reduce the amount of direct human input required to maintain a regular account but increase the apparent legitimacy of the cyborg account by occasionally breaking its bot-like behavior with human interaction. ST0045SPICE
5183PrepareEstablish Social AssetsCreate Inauthentic AccountsCreate Bot AccountsBots refer to autonomous internet users that interact with systems or other users while imitating traditional human behavior. Bots use a variety of tools to stay active without direct human operation, including artificial intelligence and big data analytics. For example, an individual may program a Twitter bot to retweet a tweet every time it contains a certain keyword or hashtag. An influence operation may use bots to increase its exposure and artificially promote its content across the internet without dedicating additional time or human resources. Amplifier bots promote operation content through reposts, shares, and likes to increase the contents online popularity. Hacker bots are traditionally covert bots running on computer scripts that rarely engage with users and work primarily as agents of larger cyberattacks, such as a Distributed Denial of Service attacks. Spammer bots are programmed to post content on social media or in comment sections, usually as a supplementary tool. Impersonator bots102 pose as real people by mimicking human behavior, complicating their detection. ST0046SPICE
5284PrepareEstablish Social AssetsCreate Inauthentic AccountsCreate Sockpuppet AccountsSockpuppet accounts refer to falsified accounts that either promote the influence operations own material or attack critics of the material online. Individuals who control sockpuppet accounts also man at least one other user account.67 Sockpuppet accounts help legitimize operation narratives by providing an appearance of external support for the material and discrediting opponents of the operation. ST0047SPICE
5386PrepareEstablish Social AssetsRecruit bad actorsRecruit ContractorsST0048
5487PrepareEstablish Social AssetsRecruit bad actorsRecruit PartisansST0049
5588PrepareEstablish Social AssetsRecruit bad actorsEnlist Troll AccountsAn influence operation may hire trolls, or human operators of fake accounts that aim to provoke others by posting and amplifying content about controversial issues. Trolls can serve to discredit an influence operations opposition or bring attention to the operations cause through debate. Classic trolls refer to regular people who troll for personal reasons, such as attention-seeking or boredom. Classic trolls may advance operation narratives by coincidence but are not directly affiliated with any larger operation. Conversely, hybrid trolls act on behalf of another institution, such as a state or financial organization, and post content with a specific ideological goal. Hybrid trolls may be highly advanced and institutionalized or less organized and work for a single individual. ST0050
5691PrepareEstablish Social AssetsBuild NetworkCreate OrganizationsInfluence operations may establish organizations with legitimate or falsified hierarchies, staff, and content to structure operation assets, provide a sense of legitimacy to the operation, or provide institutional backing to operation activities.ST0051
5792PrepareEstablish Social AssetsBuild NetworkFollow TrainsST0052
5893PrepareEstablish Social AssetsBuild NetworkCreate Community or Sub-groupST0053
5995PrepareEstablish Social AssetsAcquire/ recruit NetworkFund ProxiesAn influence operation may fund proxies, or external entities that work for the operation. An operation may recruit/train users with existing sympathies towards the operations narratives and/or goals as proxies. Funding proxies serves various purposes including: - Diversifying operation locations to complicate attribution - Reducing the workload for direct operation assets ST0054
6096PrepareEstablish Social AssetsAcquire/ recruit NetworkBotnetsST0055
6198PrepareEstablish Social AssetsInfiltrate Existing NetworksIdentify susceptible targets in networksST0056TK0016 Identify susceptible targets in networks (AMITT)
6299PrepareEstablish Social AssetsInfiltrate Existing NetworksUtilize Butterfly AttackButterfly attacks occur when operators pretend to be members of a certain social group, usually a group that struggles for representation. An influence operation may mimic a group to insert controversial statements into the discourse, encourage the spread of operation content, or promote harassment among group members. Unlike astroturfing, butterfly attacks aim to infiltrate and discredit existing grassroots movements, organizations, and media campaigns. ST0057
63105PrepareEstablish Social AssetsPrepare fundraising campaignsFrom bad actorsST0058
64106PrepareEstablish Social AssetsPrepare fundraising campaignsFrom ignorant agentsST0059
65108PrepareEstablish Social AssetsLeverage Content FarmCreate a Content FarmST0060
66109PrepareEstablish Social AssetsLeverage Content FarmOutsource Content Creation to External OrganizationsAn influence operation may outsource content creation to external companies to avoid attribution, increase the rate of content creation, or improve content quality, i.e., by employing an organization that can create content in the target audiences native language. Employed organizations may include marketing companies for tailored advertisements or external content farms for high volumes of targeted media. ST0061
67113PrepareEstablish LegitimacyCreate fake expertsUtilize Academic/Pseudoscientific JustificationsST0062
68115PrepareEstablish LegitimacyCreate personasBackstop personas Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believabilityST0063T0030 Backstop personas (AMITT)
69117PrepareEstablish LegitimacyEstablish Inauthentic News SitesCreate Inauthentic News SitesST0064T0008 Create fake or imposter news sites (AMITT)
70118PrepareEstablish LegitimacyEstablish Inauthentic News SitesLeverage Existing Inauthentic News SitesAn influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. ST0065
71120PrepareEstablish LegitimacyPrepare Assets Impersonating Legitimate EntitiesAstroturfingAstroturfing occurs when an influence operation disguises itself as grassroots movement or organization that supports operation narratives. Unlike butterfly attacks, astroturfing aims to increase the appearance of popular support for the operation cause and does not infiltrate existing groups to discredit their objectives. ST0066
72121PrepareEstablish LegitimacyPrepare Assets Impersonating Legitimate EntitiesSpoof/parody account/siteST0067
73123PrepareEstablish LegitimacyCo-opt Trusted SourcesCo-Opt Trusted IndividualsST0068
74124PrepareEstablish LegitimacyCo-opt Trusted SourcesCo-Opt Grassroots GroupsST0069
75125PrepareEstablish LegitimacyCo-opt Trusted SourcesCo-opt InfluencersST0070TK0013 Find Influencers (AMITT)
76132ExecuteMicrotargetLeverage Echo Chambers/Filter BubblesUse existing Echo Chambers/Filter BubblesST0071
77133ExecuteMicrotargetLeverage Echo Chambers/Filter BubblesCreate Echo Chambers/Filter BubblesST0072
78134ExecuteMicrotargetLeverage Echo Chambers/Filter BubblesExploit Data VoidsA data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. A 2019 report by Michael Golebiewski identifies five types of data voids. (1) “Breaking news” data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a “strategic new terms” data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on “outdated terms” that have decreased in popularity, capitalizing on most search engines preferences for recency. (4) “Fragmented concepts” data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use “problematic queries” that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term. ST0073
79137ExecuteSelect Channels and AffordancesChat appsUse Encrypted Chat AppsST0074
80138ExecuteSelect Channels and AffordancesChat appsUse Unencrypted Chats AppsST0075
81140ExecuteSelect Channels and AffordancesLivestreamVideo LivestreamST0076
82141ExecuteSelect Channels and AffordancesLivestreamAudio LivestreamST0077
83143ExecuteSelect Channels and AffordancesSocial NetworksMainstream Social NetworksExamples include Facebook, Twitter, LinkedIn, VK, ST0078
84144ExecuteSelect Channels and AffordancesSocial NetworksDating AppsST0079
85145ExecuteSelect Channels and AffordancesSocial NetworksPrivate/Closed Social NetworksST0080
86146ExecuteSelect Channels and AffordancesSocial NetworksInterest-Based NetworksExamples include smaller and niche networks including Gettr, Truth Social, Parler, etc.ST0081
87147ExecuteSelect Channels and AffordancesSocial NetworksUse hashtagsUse a dedicated, existing hashtag for the campaign/incident.ST0082T0055 Use hashtags (AMITT)
88148ExecuteSelect Channels and AffordancesSocial NetworksCreate dedicated hashtagCreate a campaign/incident specific hashtag.ST0083
89150ExecuteSelect Channels and AffordancesMedia Sharing NetworksPhoto SharingExamples include Instagram, Snapchat, Flickr, etcST0084
90151ExecuteSelect Channels and AffordancesMedia Sharing NetworksVideo SharingExamples include Youtube, TikTok, ShareChat, Rumble, etcST0085
91152ExecuteSelect Channels and AffordancesMedia Sharing NetworksAudio sharingExamples include podcasting apps, Soundcloud, etc.ST0086
92154ExecuteSelect Channels and AffordancesDiscussion ForumsAnonymous Message BoardsExamples include the ChansST0087
93161ExecuteSelect Channels and AffordancesTraditional MediaTVST0088
94162ExecuteSelect Channels and AffordancesTraditional MediaNewspaperST0089
95163ExecuteSelect Channels and AffordancesTraditional MediaRadioST0090
96175ExecuteDeliver ContentDeliver AdsSocial mediaST0091
97176ExecuteDeliver ContentDeliver AdsTraditional MediaExamples include TV, Radio, Newspaper, billboardsST0092
98178ExecuteDeliver ContentPost ContentShare MemesMemes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.ST0093
99179ExecuteDeliver ContentPost ContentPost Violative Content to Provoke Takedown and BacklashST0094
100180ExecuteDeliver ContentPost ContentOne-Way Direct PostingDirect posting refers to a method of posting content via a one-way messaging service, where the recipient cannot directly respond to the posters messaging. An influence operation may post directly to promote operation narratives to the target audience without allowing opportunities for fact-checking or disagreement, creating a false sense of support for the narrative. ST0095
101182ExecuteDeliver ContentComment or Reply on ContentPost inauthentic social media commentUse government-paid social media commenters, astroturfers, chat bots (programmed to reply to specific key words/hashtags) influence online conversations, product reviews, web-site comment forums.ST0096T0051 Fabricate social media comment (AMITT)
102186ExecuteMaximize ExposureFlooding the Information SpaceTrolls amplify and manipulateUse trolls to amplify narratives and/or manipulate narratives. Fake profiles/sockpuppets operating to support individuals/narratives from the entire political spectrum (left/right binary). Operating with increased emphasis on promoting local content and promoting real Twitter users generating their own, often divisive political content, as it's easier to amplify existing content than create new/original content. Trolls operate where ever there's a socially divisive issue (issues that can/are be politicized).ST0097T0053 Trolls amplify and manipulate (AMITT)
103187ExecuteMaximize ExposureFlooding the Information SpaceHijack existing hashtagTake over an existing hashtag to drive exposure.ST0098
104188ExecuteMaximize ExposureFlooding the Information SpaceBots Amplify via Automated Forwarding and RepostingAutomated forwarding and reposting refer to the proliferation of operation content using automated means, such as artificial intelligence or social media bots. An influence operation may use automated activity to increase content exposure without dedicating the resources, including personnel and time, traditionally required to forward and repost content. Use bots to amplify narratives above algorithm thresholds. Bots are automated/programmed profiles designed to amplify content (ie: automatically retweet or like) and give appearance it's more "popular" than it is. They can operate as a network, to function in a coordinated/orchestrated manner. In some cases (more so now) they are an inexpensive/disposable assets used for minimal deployment as bot detection tools improve and platforms are more responsive.ST0099
105189ExecuteMaximize ExposureFlooding the Information SpaceUtilize SpamoflaugeSpamoflauge refers to the practice of disguising spam messages as legitimate. Spam refers to the use of electronic messaging systems to send out unrequested or unwanted messages in bulk. Simple methods of spamoflauge include replacing letters with numbers to fool keyword-based email spam filters, for example, "you've w0n our jackp0t!". Spamoflauge may extend to more complex techniques such as modifying the grammar or word choice of the language, casting messages as images which spam detectors cannot automatically read, or encapsulating messages in password protected attachments, such as .pdf or .zip files. Influence operations may use spamoflauge to avoid spam filtering systems and increase the likelihood of the target audience receiving operation messaging. ST0100
106190ExecuteMaximize ExposureFlooding the Information SpaceConduct SwarmingSwarming refers to the coordinated use of accounts to overwhelm the information space with operation content. Unlike information flooding, swarming centers exclusively around a specific event or actor rather than a general narrative. Swarming relies on “horizontal communication” between information assets rather than a top-down, vertical command-and-control approach. ST0101
107191ExecuteMaximize ExposureFlooding the Information SpaceConduct Keyword SquattingKeyword squatting refers to the creation of online content, such as websites, articles, or social media accounts, around a specific search engine-optimized term to overwhelm the search results of that term. An influence may keyword squat to increase content exposure to target audience members who query the exploited term in a search engine and manipulate the narrative around the term. ST0102
108192ExecuteMaximize ExposureFlooding the Information SpaceInauthentic Sites Amplify News and NarrativesInauthentic sites circulate cross-post stories and amplify narratives. Often these sites have no masthead, bylines or attribution.ST0103
109195ExecuteMaximize ExposureCross-PostingPost Across GroupsST0104
110196ExecuteMaximize ExposureCross-PostingPost Across PlatformST0105
111197ExecuteMaximize ExposureCross-PostingPost Across DisciplinesST0106
112199ExecuteMaximize ExposureIncentivize SharingUse Affiliate Marketing ProgramsST0107
113200ExecuteMaximize ExposureIncentivize SharingUse Contests and PrizesST0108
114202ExecuteMaximize ExposureManipulate Platform AlgorithmBypass Content BlockingBypassing content blocking refers to actions taken to circumvent network security measures that prevent users from accessing certain servers, resources, or other online spheres. An influence operation may bypass content blocking to proliferate its content on restricted areas of the internet. Common strategies for bypassing content blocking include: - Altering IP addresses to avoid IP filtering - Using a Virtual Private Network (VPN) to avoid IP filtering - Using a Content Delivery Network (CDN) to avoid IP filtering - Enabling encryption to bypass packet inspection blocking - Manipulating text to avoid filtering by keywords - Posting content on multiple platforms to avoid platform-specific removals - Using local facilities or modified DNS servers to avoid DNS filtering ST0109
115206ExecuteDrive Online HarmsHarassBoycott/"Cancel" OpponentsCancel culture refers to the phenomenon in which individuals collectively refrain from supporting an individual, organization, business, or other entity, usually following a real or falsified controversy. An influence operation may exploit cancel culture by emphasizing an adversarys problematic or disputed behavior and presenting its own content as an alternative. ST0110
116207ExecuteDrive Online HarmsHarassHarass People Based on IdentitiesExamples include social identities like gender, sexuality, race, ethnicity, religion, ability, nationality, etc. as well as roles and occupations like journalist or activist.ST0111
117208ExecuteDrive Online HarmsHarassThreaten to DoxDoxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content. ST0112
118209ExecuteDrive Online HarmsHarassDoxDoxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content. ST0113
119212ExecuteDrive Online HarmsControl Information Environment through Offensive Cyberspace OperationsDelete Opposing ContentDeleting opposing content refers to the removal of content that conflicts with operational narratives from selected platforms. An influence operation may delete opposing content to censor contradictory information from the target audience, allowing operation narratives to take priority in the information space.ST0114
120213ExecuteDrive Online HarmsControl Information Environment through Offensive Cyberspace OperationsBlock ContentContent blocking refers to actions taken to restrict internet access or render certain areas of the internet inaccessible. An influence operation may restrict content based on both network and content attributes. ST0115
121214ExecuteDrive Online HarmsControl Information Environment through Offensive Cyberspace OperationsDestroy Information Generation CapabilitiesDestroying information generation capabilities refers to actions taken to limit, degrade, or otherwise incapacitate an actors ability to generate conflicting information. An influence operation may destroy an actors information generation capabilities by physically dismantling the information infrastructure, disconnecting resources needed for information generation, or redirecting information generation personnel. An operation may destroy an adversarys information generation capabilities to limit conflicting content exposure to the target audience and crowd the information space with its own narratives. ST0116
122215ExecuteDrive Online HarmsControl Information Environment through Offensive Cyberspace OperationsConduct Server RedirectA server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.ST0117
123217ExecuteDrive Online HarmsSuppress OppositionReport Non-Violative Opposing ContentReporting opposing content refers to notifying and providing an instance of a violation of a platforms guidelines and policies for conduct on the platform. In addition to simply reporting the content, an operation may leverage copyright regulations to trick social media and web platforms into removing opposing content by manipulating the content to appear in violation of copyright laws. Reporting opposing content facilitates the suppression of contradictory information and allows operation narratives to take priority in the information space. ST0118
124218ExecuteDrive Online HarmsSuppress OppositionGoad People into Harmful Action (Stop Hitting Yourself)Goad people into actions that violate terms of service or will lead to having their content or accounts taken down. ST0119
125219ExecuteDrive Online HarmsSuppress OppositionExploit Platform TOS/Content ModerationST0120
126223ExecuteDrive Offline ActivityEncourage Attendance at EventsCall to action to attend ST0121
127224ExecuteDrive Offline ActivityEncourage Attendance at EventsFacilitate logistics or support for attendanceFacilitate logistics or support for travel, food, housing, etc.ST0122
128226ExecuteDrive Offline ActivityOrganize EventsPay for Physical ActionPaying for physical action occurs when an influence operation pays individuals to act in the physical realm. An influence operation may pay for physical action to create specific situations and frame them in a way that supports operation narratives, for example, paying a group of people to burn a car to later post an image of the burning car and frame it as an act of protest. ST0123
129227ExecuteDrive Offline ActivityOrganize EventsConduct Symbolic ActionSymbolic action refers to activities specifically intended to advance an operations narrative by signaling something to the audience, for example, a military parade supporting a states narrative of military superiority. An influence operation may use symbolic action to create falsified evidence supporting operation narratives in the physical information space. ST0124
130229ExecuteDrive Offline ActivityConduct fundraisingConduct Crowdfunding CampaignsST0125
131231ExecuteDrive Offline ActivityPhysical ViolenceConduct Physical ViolenceST0126
132232ExecuteDrive Offline ActivityPhysical ViolenceEncourage Physical ViolenceST0127
133234ExecuteDrive Offline ActivityMerchandising/ AdvertisingSell MerchandiseSelling merchandise refers to the sale of often branded items to the target audience. An influence operation may sell merchandise to raise funds and promote its messaging in the physical information space, for example, by selling t-shirts with operational messaging displayed on the clothing. ST0128
134237ExecutePersist in the Information SpaceConceal PeopleUse PseudonymsAn operation may use pseudonyms, or fake names, to mask the identity of operation accounts, publish anonymous content, or otherwise use falsified personas to conceal identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account with the same falsified name. ST0129
135238ExecutePersist in the Information SpaceConceal PeopleConceal Network IdentityConcealing network identity aims to hide the existence an influence operations network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organization. ST0130
136239ExecutePersist in the Information SpaceConceal PeopleDistance Reputable Individuals from OperationDistancing reputable individuals from the operation occurs when enlisted individuals, such as celebrities or subject matter experts, actively disengage themselves from operation activities and messaging. Individuals may distance themselves from the operation by deleting old posts or statements, unfollowing operation information assets, or otherwise detaching themselves from the operations timeline. An influence operation may want reputable individuals to distance themselves from the operation to reduce operation exposure, particularly if the operation aims to remove all evidence.ST0131
137240ExecutePersist in the Information SpaceConceal PeopleLaunder AccountsAccount laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution. ST0132
138241ExecutePersist in the Information SpaceConceal PeopleChange Names of AccountsChanging names of accounts occurs when an operation changes the name of an existing social media account. An operation may change the names of its accounts throughout an operation to avoid detection or alter the names of newly acquired or repurposed accounts to fit operational narratives. ST0133
139243ExecutePersist in the Information SpaceConceal Operational ActivityConceal Network IdentityConcealing network identity aims to hide the existence an influence operations network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organization. ST0134
140244ExecutePersist in the Information SpaceConceal Operational ActivityGenerate Content Unrelated to NarrativeAn influence operation may mix its own operation content with legitimate news or external unrelated content to disguise operational objectives, narratives, or existence. For example, an operation may generate "lifestyle" or "cuisine" content alongside regular operation content. ST0135
141245ExecutePersist in the Information SpaceConceal Operational ActivityBreak Association with ContentBreaking association with content occurs when an influence operation actively separates itself from its own content. An influence operation may break association with content by unfollowing, unliking, or unsharing its content, removing attribution from its content, or otherwise taking actions that distance the operation from its messaging. An influence operation may break association with its content to complicate attribution or regain credibility for a new operation. ST0136
142246ExecutePersist in the Information SpaceConceal Operational ActivityDelete URLsURL deletion occurs when an influence operation completely removes its website registration, rendering the URL inaccessible. An influence operation may delete its URLs to complicate attribution or remove online documentation that the operation ever occurred.ST0137
143247ExecutePersist in the Information SpaceConceal Operational ActivityCoordinate on encrypted/ closed networksST0138
144248ExecutePersist in the Information SpaceConceal Operational ActivityDeny involvementWithout "smoking gun" proof (and even with proof), incident creator can or will deny involvement. This technique also leverages the attacker advantages outlined in "Demand insurmountable proof", specifically the asymmetric disadvantage for truth-tellers in a "firehose of misinformation" environment.ST0139T0041 Deny involvement (AMITT)
145249ExecutePersist in the Information SpaceConceal Operational ActivityDelete Accounts/Account ActivityDeleting accounts and account activity occurs when an influence operation removes its online social media assets, including social media accounts, posts, likes, comments, and other online artifacts. An influence operation may delete its accounts and account activity to complicate attribution or remove online documentation that the operation ever occurred. ST0140
146250ExecutePersist in the Information SpaceConceal Operational ActivityRedirect URLsAn influence operation may redirect its falsified or typosquatted URLs to legitimate websites to increase the operation's appearance of legitimacy, complicate attribution, and avoid detection. ST0141
147251ExecutePersist in the Information SpaceConceal Operational ActivityRemove Post OriginsRemoving post origins refers to the elimination of evidence that indicates the initial source of operation content, often to complicate attribution. An influence operation may remove post origins by deleting watermarks, renaming files, or removing embedded links in its content. ST0142
148252ExecutePersist in the Information SpaceConceal Operational ActivityMisattribute ActivityMisattributed activity refers to incorrectly attributed operation activity. For example, a state sponsored influence operation may conduct operation activity in a way that mimics another state so that external entities misattribute activity to the incorrect state. An operation may misattribute their activities to complicate attribution, avoid detection, or frame an adversary for negative behavior. ST0143
149253ExecutePersist in the Information SpaceConceal InfrastructureConceal SponsorshipConcealing sponsorship aims to mislead or obscure the identity of the hidden sponsor behind an operation rather than entity publicly running the operation. Operations that conceal sponsorship may maintain visible falsified groups, news outlets, non-profits, or other organizations, but seek to mislead or obscure the identity sponsoring, funding, or otherwise supporting these entities. Influence operations may use a variety of techniques to mask the location of their social media accounts to complicate attribution and conceal evidence of foreign interference. Operation accounts may set their location to a false place, often the location of the operations target audience, and post in the regions languageST0144
150255ExecutePersist in the Information SpaceConceal InfrastructureUtilize Bulletproof HostingHosting refers to services through which storage and computing resources are provided to an individual or organization for the accommodation and maintenance of one or more websites and related services. Services may include web hosting, file sharing, and email distribution. Bulletproof hosting refers to services provided by an entity, such as a domain hosting or web hosting firm, that allows its customer considerable leniency in use of the service. An influence operation may utilize bulletproof hosting to maintain continuity of service for suspicious, illegal, or disruptive operation activities that stricter hosting services would limit, report, or suspend. ST0145
151256ExecutePersist in the Information SpaceConceal InfrastructureUse Shell OrganizationsST0146
152257ExecutePersist in the Information SpaceConceal InfrastructureUse CryptocurrencyST0147
153258ExecutePersist in the Information SpaceConceal InfrastructureObfuscate PaymentST0148
154260ExecutePersist in the Information SpaceExploit TOS/Content ModerationLegacy web contentMake incident content visible for a long time, e.g. by exploiting platform terms of service, or placing it where it's hard to remove or unlikely to be removed.ST0149
155261ExecutePersist in the Information SpaceExploit TOS/Content ModerationPost Borderline ContentST0150
156266AssessAssess EffectivenessMeasure PerformancePeople FocusedST0151
157267AssessAssess EffectivenessMeasure PerformanceContent FocusedST0152
158268AssessAssess EffectivenessMeasure PerformanceView FocusedST0153
159270AssessAssess EffectivenessMeasure EffectivenessBehavior changesMonitor and evaluate behaviour changes from misinformation incidents. ST0154T0062 Behaviour changes (AMITT)
160271AssessAssess EffectivenessMeasure EffectivenessContentST0155
161272AssessAssess EffectivenessMeasure EffectivenessAwarenessST0156
162273AssessAssess EffectivenessMeasure EffectivenessKnowledgeST0157
163274AssessAssess EffectivenessMeasure EffectivenessAction/attitudeST0158
164276AssessAssess EffectivenessMeasure Effectiveness Indicators (or KPIs)Message reachMonitor and evaluate message reach in misinformation incidents. ST0159T0063 Message reach (AMITT)
165277AssessAssess EffectivenessMeasure Effectiveness Indicators (or KPIs)Social media engagementMonitor and evaluate social media engagement in misinformation incidents.ST0160T0064 Social media engagement (AMITT)
1663PlanPlan StrategyDetermine Target Audiencesn/aT0001DISARM Revision Process
1674PlanPlan StrategyDetermine Strategic Endsn/aT0002DISARM Revision Process
1686PlanPlan ObjectivesDismissn/aPush back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased.T0003
1698PlanPlan ObjectivesDistortn/aTwist the narrative. Take information, or artifacts like images, and change the framing around them.T0004AMITTT0001 5Ds
1709PlanPlan ObjectivesDistractn/aShift attention to a different narrative or actor, for instance by accusing critics of the same activity that theyve accused you of (e.g. police brutality).T0005AMITTT0001 5Ds
17110PlanPlan ObjectivesDismayn/aThreaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story.T0006AMITTT0001 5Ds
17211PlanPlan ObjectivesDividen/aCreate conflict between subgroups, to widen divisions in a communityT0007AMITTT0001 5Ds
17312PlanPlan ObjectivesDegrade Adversaryn/aPlan to degrade an adversarys image or ability to act. This could include preparation and use of harmful information about the adversarys actions or reputation.T0008AMITTT0066 Degrade Adversary
17413PlanPlan ObjectivesFacilitate State Propagandan/aOrganize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda.T0009AMITTT0002 Facilitate State Propaganda
17515PlanTarget Audience AnalysisMap Target Audience Information Environmentn/aMapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.T0010SPICETA04 Map Target Audience Information Environment
17621PlanTarget Audience AnalysisIdentify Social and Technical Vulnerabilitiesn/aIdentifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. T0011SPICE
17730PlanTarget Audience AnalysisSegment Audiencesn/aCreate audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. T0012AMITT
17838PrepareDevelop NarrativesDevelop New Narrativesn/aT0013
17939PrepareDevelop NarrativesLeverage Existing Narrativesn/aUse or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. T0014AMITTT0003 Leverage Existing Narratives (AMITT)
18040PrepareDevelop NarrativesDevelop Competing Narrativesn/aAdvance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach.T0015AMITTT0004 Develop Competing Narratives (AMITT)
18141PrepareDevelop NarrativesLeverage Conspiracy Theory Narrativesn/a"Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. T0016AMITTT0022 Leverage Conspiracy Theory narratives (AMITT)
18244PrepareDevelop NarrativesIntegrate Target Audience Vulnerabilities into Narrativen/aAn influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operations narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment.T0017
18345PrepareDevelop NarrativesRespond to Breaking News Event or Active Crisisn/aMedia attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. T0018
18446PrepareDevelop NarrativesDemand insurmountable proofn/aCampaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof.T0019T0040 Demand insurmountable proof (AMITT)
18548PrepareDevelop ContentReuse Existing Contentn/aWhen an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. T0020
18653PrepareDevelop ContentDevelop Text-based Contentn/aT0021
18757PrepareDevelop ContentDevelop Image-based Contentn/aT0022
18862PrepareDevelop ContentDevelop Video-based Contentn/aT0023
18965PrepareDevelop ContentDevelop Audio-based Contentn/aT0024
19068PrepareDevelop ContentGenerate information pollutionn/aFlood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign.T0025T0019 Generate information pollution
19171PrepareDevelop ContentDistort factsn/aChange, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper contentT0026T0023 Distort facts (AMITT)
19274PrepareDevelop ContentCreate hashtags and search artifactsn/aCreate one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). T0027T0015 Create hashtags and search artifacts (AMITT)
19375PrepareDevelop ContentObtain Private Documentsn/aT0028
19480PrepareEstablish Social AssetsCreate Inauthentic Accountsn/aT0029
19585PrepareEstablish Social AssetsRecruit bad actorsn/aT0030
19689PrepareEstablish Social AssetsCultivate ignorant agentsn/aCultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the states own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents".T0031T0010 Cultivate ignorant agents (AMITT)
19790PrepareEstablish Social AssetsBuild Networkn/aT0032TK0014 Build Network (AMITT)
19894PrepareEstablish Social AssetsAcquire/ recruit Networkn/aT0033
19997PrepareEstablish Social AssetsInfiltrate Existing Networksn/aT0034
200100PrepareEstablish Social AssetsCreate Inauthentic Social Media Pages and Groupsn/aCreate key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are.T0035
201101PrepareEstablish Social AssetsCreate inauthentic websitesn/aCreate media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations.T0036T0013 Create fake websites  (AMITT)
202102PrepareEstablish Social AssetsPrepare Physical Broadcast Capabilitiesn/aCreate or coopt broadcast capabilities (e.g. TV, radio etc).T0037T0065 Prepare Physical Broadcast Capabilities (AMITT)
203103PrepareEstablish Social AssetsDevelop Owned Media Assetsn/aAn owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content.T0038
204104PrepareEstablish Social AssetsPrepare fundraising campaignsn/aFundraising campaigns refer to an influence operations systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. T0039T0014 Prepare fundraising campaigns (AMITT)
205107PrepareEstablish Social AssetsLeverage Content Farmn/aT0040
206111PrepareEstablish LegitimacyCompromise legitimate accountsn/aHack or take over legimate accounts to distribute misinformation or damaging content.T0041T0011 Compromise legitimate accounts (AMITT)
207112PrepareEstablish LegitimacyCreate fake expertsn/aStories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. T0042T0009 Create fake experts (AMITT)
208114PrepareEstablish LegitimacyCreate personasn/aT0043TK0010 Create personas (AMITT)
209116PrepareEstablish LegitimacyEstablish Inauthentic News Sitesn/aModern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.T0044
210119PrepareEstablish LegitimacyPrepare Assets Impersonating Legitimate Entitiesn/aAn influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entitys website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. T0045
211122PrepareEstablish LegitimacyCo-opt Trusted Sourcesn/aAn influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: - National or local new outlets - Research or academic publications - Online blogs or websites T0046
212128ExecuteMicrotargetCreate Clickbaitn/aCreate attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset.T0047T0016 Create Clickbait (AMITT)
213129ExecuteMicrotargetPurchase Targeted Advertisementsn/aCreate or fund advertisements targeted at specific populationsT0048T0018 Purchase Targeted Advertisements (AMITT)
214130ExecuteMicrotargetCreate Localized Contentn/aLocalized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution.T0049
215131ExecuteMicrotargetLeverage Echo Chambers/Filter Bubblesn/aAn echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. T0050
216136ExecuteSelect Channels and AffordancesChat appsn/aDirect messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.T0051T0043 Use SMS/ WhatsApp/ Chat apps (AMITT)
217139ExecuteSelect Channels and AffordancesLivestreamn/aT0052
218142ExecuteSelect Channels and AffordancesSocial Networksn/aT0053
219149ExecuteSelect Channels and AffordancesMedia Sharing Networksn/aMedia sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.T0054
220153ExecuteSelect Channels and AffordancesDiscussion Forumsn/aPlatforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc.T0055
221155ExecuteSelect Channels and AffordancesBookmarking and Content Curationn/aPlatforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc.T0056
222156ExecuteSelect Channels and AffordancesBlogging and Publishing Networksn/aExamples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. T0057
223157ExecuteSelect Channels and AffordancesConsumer Review Networksn/aPlatforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc.T0058
224158ExecuteSelect Channels and AffordancesOnline pollsn/aCreate fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as wellT0059T0029 Manipulate online polls (AMITT)
225159ExecuteSelect Channels and AffordancesFormal Diplomatic Channelsn/aT0060
226160ExecuteSelect Channels and AffordancesTraditional Median/aExamples include TV, Newspaper, Radio, etc.T0061
227164ExecuteSelect Channels and AffordancesEmailn/aT0062
228166ExecuteConduct Pump PrimingTrial contentn/aIteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion ratesT0063AMITTT0020 Trial content (AMITT)
229167ExecuteConduct Pump PrimingBait legitimate influencersn/aCredibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.T0064AMITTT0039 Bait legitimate influencers (AMITT)
230168ExecuteConduct Pump PrimingSeed Kernel of truthn/aWrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters.T0065AMITTT0042 Seed Kernel of truth (AMITT)
231169ExecuteConduct Pump PrimingSeed distortionsn/aTry a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. T0066AMITTT0044 Seed distortions (AMITT)
232170ExecuteConduct Pump PrimingUse fake expertsn/aUse the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential biasT0067AMITTT0045 Use fake experts (AMITT)
233171ExecuteConduct Pump PrimingUse Search Engine Optimizationn/aManipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" T0068AMITTT0046 Search Engine Optimization (AMITT)
234172ExecuteConduct Pump PrimingEmploy Commercial Analytic Firmsn/aCommercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. T0069SPICEEmploy Commercial Analytic Firms
235174ExecuteDeliver ContentDeliver Adsn/aDelivering content via any form of paid media or advertising.T0070
236177ExecuteDeliver ContentPost Contentn/aDelivering content by posting via owned media (assets that the operator controls). T0071
237181ExecuteDeliver ContentComment or Reply on Contentn/aDelivering content by replying or commenting via owned media (assets that the operator controls). T0072
238183ExecuteDeliver ContentAttract Traditional Median/aDeliver content by attracting the attention of traditional media (earned media).T0073
239185ExecuteMaximize ExposureFlooding the Information Spacen/aFlooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.T0074T0049 Flooding
240193ExecuteMaximize ExposureAmplify Existing Narrativen/aAn influence operation may amplify existing narratives that align with its narratives to support operation objectives. T0075
241194ExecuteMaximize ExposureCross-Postingn/aCross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. T0076
242198ExecuteMaximize ExposureIncentivize Sharingn/aIncentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.T0077
243201ExecuteMaximize ExposureManipulate Platform Algorithmn/aManipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platforms algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operations strategy. For example, an influence operation may use bots to amplify its posts so that the platforms algorithm recognizes engagement with operation content and further promotes the content on user timelines. T0078
244203ExecuteMaximize ExposureDirect Users to Alternative Platformsn/aDirect users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. T0079
245205ExecuteDrive Online HarmsHarassn/aThreatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. T0080
246210ExecuteDrive Online HarmsCensor social media as a political forcen/aUse political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports).T0081T0047 Censor social media as a political force (AMITT)
247211ExecuteDrive Online HarmsControl Information Environment through Offensive Cyberspace Operationsn/aControling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging.T0082
248216ExecuteDrive Online HarmsSuppress Oppositionn/aT0083
249220ExecuteDrive Online HarmsPlatform Filteringn/aPlatform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation)T0084
250222ExecuteDrive Offline ActivityEncourage Attendance at Eventsn/aOperation encourages attendance at existing real world event.T0085
251225ExecuteDrive Offline ActivityOrganize Eventsn/aCoordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.T0086T0057 Organise remote rallies and events (AMITT)
252228ExecuteDrive Offline ActivityConduct fundraisingn/aFundraising campaigns refer to an influence operations systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. T0087
253230ExecuteDrive Offline ActivityPhysical Violencen/aPhysical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. T0088
254233ExecuteDrive Offline ActivityMerchandising/ Advertisingn/aMerchandising/Advertising refers to getting the message or narrative into physical space in the offline worldT0089
255236ExecutePersist in the Information SpaceConceal Peoplen/aConceal the identity or provenance of the account and people assets.T0090
256242ExecutePersist in the Information SpaceConceal Operational Activityn/aT0091
257254ExecutePersist in the Information SpaceConceal Infrastructuren/aT0092
258259ExecutePersist in the Information SpaceExploit TOS/Content Moderationn/aT0093
259262ExecutePersist in the Information SpacePlay the long gamen/aPlay the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative.T0094T0059 Play the long game
260265AssessAssess EffectivenessMeasure Performancen/aT0095
261269AssessAssess EffectivenessMeasure Effectivenessn/aT0096
262275AssessAssess EffectivenessMeasure Effectiveness Indicators (or KPIs)n/aT0097
2632PlanPlan Strategyn/an/aDefine the desired end state, i.e. the set of required conditions that defines achievement of all objectives.TA01AMITTTA01: Strategic Planning
2645PlanPlan Objectivesn/an/aSet clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: - Each desired effect should link directly to one or more objectives - The effect should be measurable - The objective statement should not specify the way and means of accomplishment - The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.TA02AMITTTA02: Objective Planning
26514PlanTarget Audience Analysisn/an/aIdentifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. TA03SPICE and AMITTT0005 Center of Gravity Analysis
26637PrepareDevelop Narrativesn/an/aThe promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a "whole of society" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline. TA04
26747PrepareDevelop Contentn/an/aTA05
26879PrepareEstablish Social Assetsn/an/aEstablishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.TA06
269110PrepareEstablish Legitimacyn/an/aTA07
270127ExecuteMicrotargetn/an/aTarget very specific populations of peopleTA08TA05 "Microtargeting"
271135ExecuteSelect Channels and Affordancesn/an/aSelecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operations ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content.TA09
272165ExecuteConduct Pump Primingn/an/aRelease content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. TA10
273173ExecuteDeliver Contentn/an/aRelease content to general public or larger populationTA11
274184ExecuteMaximize Exposuren/an/aMaximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting.TA12
275204ExecuteDrive Online Harmsn/an/aActions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. TA13
276221ExecuteDrive Offline Activityn/an/aMove incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. TA14
277235ExecutePersist in the Information Spacen/an/aPersist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign.TA15
278264AssessAssess Effectivenessn/an/aTA16