Deepfake technology intentionally using the likeness of famous and/or credible authorities in an effort to shape the behaviors, attitudes, beliefs and/or emotions of the target audience
Voice Heists are a form of deepfake audio attack. In particular, it is the use of artificial intelligence to manipulate or create audio, cloning the voice(s) of legitimate individuals, often company executives. The voice clone is then used to trick companies, banks or other organizations to transfer funds to accounts controlled by the deepfake attacker.
маскировка ("maskirovka") is the Russian doctrine and tactics of military denial & deception
Reflexive Control is a uniquely old Soviet Union (USSR)—and now Russian Federation—concept of a campaign that feeds an adversary select misdirecting information so that the adversary makes the decisions that Russia wants him/her to. Methods of reflexive control include spreading false information, leaking partial information at opportune moments, and projecting a different posture of Russia than what may actually be true. The goal of reflexive control is to ‘control’ the ‘reflex’ of the adversary by creating a certain model of behavior in the system it seeks to control.
Influence operations, also known as information operations or psychological operations, are strategic approaches used to shape the perceptions, decisions, and behaviors of target audiences to achieve specific objectives.
Intentional strategy and tactics meant to mislead, misdirect and manipulate the perceptions of a target audience through simulation (showing the false) and/or dissimulation (hiding the real)
Zishing, or Zoom-based phishing attacks, wherein a threat adversary (TA) uses deepfake technology to realistically emulate known, familiar or expected interactant(s) to deceive the victim on the video call to comply with requests in the interest of the TA.
The tendency to seek information that confirms or supports a predetermined position or conclusion.
It is a perceptual blindness (rarely called inattentive blindness) that occurs when an individual fails to perceive an unexpected stimulus in plain sight, purely as a result of a lack of attention rather than any vision defects or deficits.
A perceptual effect that hides or shows an element by animating its background color first.
In assessing other people, it is the tendency for a person’s positive trait to be generalized to possess other positive traits.
Tendency to continue with a behavioral track once starting on that track. Can be exploited by obtaining target compliance with a small request, and later making a larger request.
Tendency to comply with authority figures (usually legal or expert authorities). Exploitable by assuming the persona or impersonating an authority figure.
The Mere Exposure Effect is a cognitive bias where individuals show a preference for things they’re more familiar with. Repeated exposure to a stimulus increases liking and familiarity, even without conscious recognition.
Both humans and automation may be targeted by synthetic media attacks. This criteria references whether the target of the attack was human or automation. The highlighted icon represents the intended target of this submitted media.
A measure of if the attack was constructed by a human or by artificial intelligence. The highlighted icon represents the method of control of this submitted media.
The medium is the format of the content submitted. Highlighted items represent all of the various formats contained in the submitted content.
Text
Image
Video
Audio
Technical complexity of the atttack.
How damaging the attack was intended to be.
Chaos injection is the intentional introduction of evocative material--which is often ambiguous and unresolved--to cause confusion and disorder.
Leading the target audience to believe that something acceptable or benign is occurring to reduce vigilance.
Intentional strategy and tactics meant to mislead, misdirect and manipulate the perceptions of a target audience through simulation (showing the false) and/or dissimulation (hiding the real)
Intentional effort to shape the perceptions, decisions, and behaviors of target audiences to achieve specific objectives.
Motivation is the underlying activator, purpose or sustained reasons for why the deepfake threat actor wants to create nefarious synthetic media.
No case specific insights generated.
Targeting is the threat actor’s intentional selection of a target audience, or the group or individual whom he is interested in impacting with his deepfake campaign.
No case specific insights generated.
Research & Reconnaissance occurs when the threat actor is effortfully gathering information about the target audience, the optimal channels to conduct their campaign on, the relevant narratives for the attack, and type of content that will have the desired impact on the target audience.
No case specific insights generated.
Preparation & Planning are the steps and processes that the threat actor takes to acquire the tools and content needed to create the deepfake media for their campaign and their deliberation for the execution of the campaign.
No case specific insights generated.
Production is the threat actor’s use of tools and content for the creation and development of deepfake media for their attack campaign.
No case specific insights generated.
Narrative Testing. A narrative is a story, or an account of related events or experiences. A good narrative will have story coherence, such that both the story being told and its relationship to the real world are cohesive and clear. In deepfake campaigns, threat actors consider and evaluate the possible narratives—particularly in relation to events and context—to support the campaign in an effort to maximize the believability and efficacy of the attack.
No case specific insights generated.
Deployment is the threat actor’s intentional transmission of deepfake content to the target audience through selected online channels.
No case specific insights generated.
Amplification is the threat actor’s intentional efforts to maximize the visibility, virality and target audience exposure to their deepfake content.
No case specific insights generated.
Post-Campaign is the period after the target audience has received and been exposed to the deepfake content.
No case specific insights generated.