Back
Six techniques of malign information influence activities
Countering information influence activities. A handbook for journalists
Course evaluation and feedback
Course certificate

SOCIAL AND COGNITIVE HACKING

• Dark ads

• Bandwagon effects

• Spiral of silence

• Echo chambers and filter bubbles

DECEPTIVE IDENTITIES

• Shills

• Impostors and cheats

• Counterfeits

• Potemkin villages

• Fake media

SYMBOLIC ACTIONS

• Leaking

• Hacking

• Public demonstrations

MALICIOUS RHETORIC

• Ad hominem

• Whataboutism

• Gish-gallop

• Strawman

• Hijacking

DISINFORMATION

• Fabrication

• Manipulation

• Misappropriation

• Satire and parody

TECHNICAL EXPLOITATION

• Bots

• Sockpuppets

• Deepfakes

• Phishing