AMITT/techniques/T0012.md
Sara-Jayne Terp ca08d63fdb Updated the TA01 Strategic Planning counters
Team has been triaging counters using a github project.  These are the changes to TA01:

- Add C00220: develop a monitoring and intelligence plan
- C00159: change title
- Add C00221: run a disinformation red team, and design mitigation factors
- C00176: change title
- Merge C00055 into C00012
- Merge C00057 into C00010
- C0006: update notes
- C00153: change title
- C00017: change title
- Merge C00023 into C00027
- Merge C00025 and C00024, change title to "promote healthy narratives"
- Merge C00018 and C00019, change title to "reduce effect of division-enablers"
- C00026 - change title
- C00022 - change title
- Merge C00020 , C00174, C00157, change title to "create a healthier news environment"
- Merge C00007 into C00013, edit title
- Move C00008 to Degrade
- Merge C00033, C00054, C00061, C00049 into C00073
- C00016 - change title
- Delete C00001: Better models of info spread up the layers
- Delete C00004: Managing like a chronic disease
- Delete C00003: How can we safeguard against extremists using the tools that we will produce?
- Delete C00005: Policy: makers, terminology, elements: a) broad, b) specific

TA01 now contains techniques [6, 8, 10, 12, 13, 15, 16, 17, 19, 21, 22, 24, 26, 27, 73, 153, 159, 161, 170, 174, 176, 205, 220, 221]
2021-02-24 21:02:41 +00:00

1.1 KiB

Technique T0012: Use concealment

  • Summary: Use anonymous social media profiles. Examples include page or group administrators, masked "whois" website directory data, no bylines connected to news article, no masthead connect to news websites.

Example is 2016 @TEN_GOP profile where the actual Tennessee Republican Party tried unsuccessfully for months to get Twitter to shut it down, and 2019 Endless Mayfly is an Iran-aligned network of inauthentic personas and social media accounts that spreads falsehoods and amplifies narratives critical of Saudi Arabia, the United States, and Israel.

  • Belongs to tactic stage: TA04
Incident Descriptions given for this incident
Counters Response types
C00050 Anti-elicitation training D2 Deny
C00051 Phishing prevention education etc D2 Deny
C00052 Infiltrate platforms D4 Degrade
C00073 Inoculate populations through media literacy training D2 Deny

DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW