Skip to content

DisinfoDB

People are trying to manipulate you online. Let's stop that happening!

  • Techniques
    • Technique Spotlights
    • Technique Assessments
  • Archives
    • The Archives
      • Content Archives – The Basics
      • Content Archives – Tactics Focussed
      • Content Archives – Everything
    • Archive Tags
  • Other Resources
    • Podcasts
    • Books
  • Contact

Category Archives: Technique Spotlight

Technique Spotlight: Algospeak

Algospeak is used to make it harder for automated moderation to detect harmful content

Posted byAdam M20th October 202224th October 2022Posted inTactic, Tactic Spotlight, Technique SpotlightTags:Technique Spotlight

Technique Spotlight: Compromise Legitimate Accounts (T0011)

A threat actor can hijack someone’s credibility by accessing their social media accounts (for example by using stolen passwords), and posting as them.

Posted byAdam M19th October 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Using ‘Paper Terrorism’ to coerce targets and waste their resources

Paper Terrorism is a harassment tactic in which people coordinate in order to hit a target with lots of illegitimate lawsuits at the same time, threatening to use them to take away targets’ money or freedom unless they acquiesce to a set of demands.

Posted byAdam M11th April 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Technique Spotlight: Impersonating an existing news organisation

Threat actors can exploit peoples’ existing trust for a news organisation by pretending to be them when disseminating falsehoods. This also wastes resource of the targeted organisation.

Posted byAdam M10th April 202228th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Impersonating a Fact Checker

Impersonating a Fact Checker to spread fake fact checks makes people think it’s hard to get accurate information about the topic. It also exploits peoples’ existing faith in Fact Checkers to increase the probability that people believe posted content.

Posted byAdam M2nd April 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Influencers being paid to amplify inauthentic messages to their audience

Building an audience that will reliably read the content you post is difficult, so threat actors can pay others who have already built an audience to share what they’ve produced. This has the added benefit of appearing more authentic.

Posted byAdam M22nd March 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Using Whataboutism to avoid addressing accusations

To avoid addressing an accusation, the accused can return fire with a whataboutism; “You’re criticising my actions? But what about the bad actions you’ve taken?”, moving conversational focus on to the accuser’s imperfections.

Posted byAdam M13th March 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Using AI Generated profile pictures in inauthentic Social Media accounts to appear more legitimate

People have made computer programs that can create realistic-looking pictures of people that don’t physically exist. Threat actors use these to make inauthentic social media accounts appear more legitimate.

Posted byAdam M5th March 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Presenting legitimate media with false context to support a desired narrative

It can be hard to falsify a convincing piece of media, so one strategy used is to take real content and create a false context which matches the desired narrative.

Posted byAdam M26th February 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Manufacturing a Tactical Infodemic to make true information harder to find

Let’s say there is someone who wants to find out about a topic, but you don’t want them to succeed. One way you could make it harder for them is to intentionally flood the pool of information surrounding said topic with false data.

Posted byAdam M29th January 202224th October 2022Posted inTechnique SpotlightTags:Technique Spotlight

Posts navigation

1 2 Older posts
DisinfoDB,
 

Loading Comments...