FOREIGN INTERFERENCE TAXONOMY - CISA · 2019. 12. 2. · FOREIGN INTERFERENCE TAXONOMY FOREIGN...

1
FOREIGN INTERFERENCE TAXONOMY FOREIGN INTERFERENCE Malign actions taken by foreign governments or foreign actors designed to sow discord, manipulate public discourse, discredit the electoral system, bias the development of policy, or disrupt markets for the purpose of undermining the interests of the United States and its allies. Trade/ Coercion/ Migration International Org. INFORMATION ACTIVITIES Strategic Investment Corruption Exploitation Manipulation Activities undertaken to shape public opinion or undermine trust in the NEW MEDIA ABUSE TRADITIONAL MEDIA ABUSE authenticity of information. Use of new and traditional media to amplify divides Manipulating content service providers Using traditional media outlets to report and foment unrest in the homeland, (CSPs) to create and amplify false and false ordistorted information, strategically sometimes coordinated with illicit distorted content for targeted individuals leak stoleninformation, or repeat preferred cyber activities. or groups. narratives in order to manipulate a general public. 1HZ PHGLD DEXVH DOORZV LQÁXHQFHUV to reach a large audience cheaply Purposefully causing traditional media WHAT TYPE OF INFORMATION IS USED? and quickly, allowing adversaries to sources to report false or misleading commandeer and control narratives. information increases the spread of foreign CYBER ACTIVITIES pushed narratives and undermines the Malign foreign actors, often hiding behind fake or automated credibility of the press. accounts, use demonstrably false information, innuendo, and rumors +DFNLQJ PD\ EHQHÀW LQIRUPDWLRQ to push or amplify their narratives. While many posts boil down to activities. They assist in surveillance XQFRQÀUPDEOH RSLQLRQV PXFK RI WKH LQIRUPDWLRQ FRQWHQW IDOOV LQWR D or reconnaissance and provide few broad categories. opportunities for destructive attacks. Innocent reporting errors ( misinformation) or satire and parody Hijacking accounts and defacing content can be re-purposed and distributed maliciously with the public facing sites can be used to LQWHQW WR GHFHLYH 2IWHQ ´IDNHµ FRQWHQW LV FUHDWHG ZLWK WKH VSHFLÀF LQÁXHQFH SXEOLF RSLQLRQ &RPSURPLVHG intent to dupe or incite audiences ( disinformation). government systems (e.g., voting systems, data repositories) can lead to Facts are also used maliciously, and out of context, to improperly citizens to question the security of the LQÁXHQFH DXGLHQFHV malinformation). This sort of content is information provided to the government. sometimes the result of illicit cyber activity like spying or hacking and leaked through third parties. Key Stakeholders: DOJ/FBI; State; Intelligence Community; State, Local, Territorial and Tribal Governments; Foreign Partners; Social Media Companies; Traditional Media Companies; Academia/Research; Think Tanks; and Philanthropy. Department of Homeland Security July 2018

Transcript of FOREIGN INTERFERENCE TAXONOMY - CISA · 2019. 12. 2. · FOREIGN INTERFERENCE TAXONOMY FOREIGN...

Page 1: FOREIGN INTERFERENCE TAXONOMY - CISA · 2019. 12. 2. · FOREIGN INTERFERENCE TAXONOMY FOREIGN INTERFERENCE Malign actions taken by foreign governments or foreign actors designed

FOREIGN INTERFERENCE TAXONOMY FOREIGN INTERFERENCE

Malign actions taken by foreign governments or foreign actors designed to sow discord, manipulate public discourse, discredit the electoral system, bias the development of policy, or disrupt markets for the purpose of undermining the interests of the United States and its allies.

Trade/ Coercion/ Migration International Org. INFORMATION ACTIVITIES Strategic Investment Corruption Exploitation ManipulationActivities undertaken to shape public opinion or undermine trust in the NEW MEDIA ABUSE TRADITIONAL MEDIA ABUSEauthenticity of information. Use of new and traditional media to amplify divides

Manipulating content service providers Using traditional media outlets to report and foment unrest in the homeland, (CSPs) to create and amplify false and false ordistorted information, strategically sometimes coordinated with illicit distorted content for targeted individuals leak stoleninformation, or repeat preferred cyber activities.or groups. narratives in order to manipulate a

general public.

to reach a large audience cheaply Purposefully causing traditional media WHAT TYPE OF INFORMATION IS USED?and quickly, allowing adversaries to sources to report false or misleading commandeer and control narratives. information increases the spread of foreign CYBER ACTIVITIES pushed narratives and undermines the Malign foreign actors, often hiding behind fake or automated

credibility of the press. accounts, use demonstrably false information, innuendo, and rumors to push or amplify their narratives. While many posts boil down to

activities. They assist in surveillance or reconnaissance and provide few broad categories.opportunities for destructive attacks.

Innocent reporting errors (misinformation) or satire and parody Hijacking accounts and defacing

content can be re-purposed and distributed maliciously with the public facing sites can be used to

intent to dupe or incite audiences (disinformation). government systems (e.g., voting systems, data repositories) can lead to Facts are also used maliciously, and out of context, to improperly citizens to question the security of the malinformation). This sort of content is information provided to the government. sometimes the result of illicit cyber activity like spying or hacking and

leaked through third parties.

Key Stakeholders: DOJ/FBI; State; Intelligence Community; State, Local, Territorial and Tribal Governments; Foreign Partners; Social Media Companies; Traditional Media Companies; Academia/Research; Think Tanks; and Philanthropy.

Department of Homeland Security July 2018