There are many fantastic articles which have been written on disinformation, misinformation, and influence operations. This body of work contains lots of valuable data on how people manipulate others online, but it’s hard to use this data without collating and standardising it first. DisinfoDB does both; articles are gathered and categorised based on the techniques used (and a load of other useful things like platform, or narrative theme).
Technique Spotlights
Threat actors use a variety of different Techniques when conducting an influence operation to achieve Tactical goals. Check out the posts below to learn more about these Techniques, and access aggregated reporting referencing them.
Technique Assessments
DisinfoDB Analysts associate reporting with Tactics and Techniques. We want our work to be auditable and trustworthy, so in these posts we provide more insight into why a piece of content has been associated with a particular Technique.
Vulnerability Spotlights
Threat Actors looking to manipulate us can exploit vulnerabilities to increase their probability of success.
Environmental Factors
Environmental Factors are things which passively contribute to the spread of dis/misinformation. One example would be Covid-19; at the start of the pandemic people knew very little about it, but wanted to know very much. This combination meant inauthentic narratives could more easily spread; people trying to learn about Covid could accidentally take in bad information. This situation wasn’t intentionally manufactured to spread dis/misinformation, but it was one that helped achieve that goal.
Mitigations
There are steps we can take to reduce the probability that threat actors’ Tactics can successfully manipulate us. These profiles detail some of those steps: