<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cognitiveattacktaxonomy.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=EE</id>
	<title>Cognitive Attack Taxonomy - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cognitiveattacktaxonomy.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=EE"/>
	<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php/Special:Contributions/EE"/>
	<updated>2026-05-12T02:28:34Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Telemarketing_Scam&amp;diff=408</id>
		<title>Telemarketing Scam</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Telemarketing_Scam&amp;diff=408"/>
		<updated>2024-07-30T05:17:14Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Telemarketing Scam  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Scam impersonating a telemarketer in an attempt to commit fraud. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-259 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Telemarketing Scam  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Scam impersonating a telemarketer in an attempt to commit fraud. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-259 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Scam impersonating a telemarket attempting to seel something, but is actually fraudulent. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Virtual_Kidnapping&amp;diff=406</id>
		<title>Virtual Kidnapping</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Virtual_Kidnapping&amp;diff=406"/>
		<updated>2024-07-30T05:16:44Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Virtual Kidnapping  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A hoax scam that attempts to convince a victim that scammers are holding a loved one hostage. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-260 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Virtual Kidnapping  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A hoax scam that attempts to convince a victim that scammers are holding a loved one hostage. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-260 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A hoax scam that attempts to convince a victim that the kidnappers (the scammers) are holding a loved one hostage for ransom, which the victim must pay. These scams often incorporate photos of the victim or may impersonate the victim&#039;s phone number, email, or other identified communications platform.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Virus_Hoax&amp;diff=405</id>
		<title>Virus Hoax</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Virus_Hoax&amp;diff=405"/>
		<updated>2024-07-30T05:16:14Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Virus Hoax  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Software that intentionally presents false claims of a computer virus infection. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-261 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;M...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Virus Hoax  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Software that intentionally presents false claims of a computer virus infection. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-261 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Software that intentional presents false claims of a computer virus infection (similar to scareware) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Deepfake_Social_Engineering&amp;diff=403</id>
		<title>Deepfake Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Deepfake_Social_Engineering&amp;diff=403"/>
		<updated>2024-07-30T05:15:31Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Deepfake Social Engineering  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Attacker employs a manipulated audio or video &amp;quot;puppet&amp;quot; to take on the appearance through similar. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-262 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Relat...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Deepfake Social Engineering  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Attacker employs a manipulated audio or video &amp;quot;puppet&amp;quot; to take on the appearance through similar. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-262 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Attacker employs a manipulated audio or video &amp;quot;puppet&amp;quot; to take on the appearance through similar sight or sound of a familiar person; either a celebrity, public figure, known associate, or close relation.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Synthetic_Media_Social_Engineering&amp;diff=401</id>
		<title>Synthetic Media Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Synthetic_Media_Social_Engineering&amp;diff=401"/>
		<updated>2024-07-30T05:14:31Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Synthetic Media Social Engineering  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  An attacker uses synthetic media to impersonate someone else in an online communication. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-263 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Synthetic Media Social Engineering  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  An attacker uses synthetic media to impersonate someone else in an online communication. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-263 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The use of synthetic (or AI generated) media to disguise oneself during a deceptive social engineering engagement.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=EWhoring&amp;diff=399</id>
		<title>EWhoring</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=EWhoring&amp;diff=399"/>
		<updated>2024-07-30T05:14:02Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;eWhoring  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Fraudulently impersonating other people as sex models or partners. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-264 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;eWhoring  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Fraudulently impersonating other people as sex models or partners. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-264 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A technique used by online scammers in which they fraudulently impersonate other people as sex models and then ask victims for money or items of value in exchange for sexually explicit photos, video, and/or conversations.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Jolly_Roger_Bot&amp;diff=397</id>
		<title>Jolly Roger Bot</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Jolly_Roger_Bot&amp;diff=397"/>
		<updated>2024-07-30T05:13:28Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Jolly Roger Bot  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A voice bot that responds to voice sounds with inanne statements about unrelated topics. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-265 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Tool / TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Jolly Roger Bot  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A voice bot that responds to voice sounds with inanne statements about unrelated topics. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-265 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Tool / TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A voice bot that responds to voice sounds with inanne statements about unrelated topics, with the intention of wasting the time of telemarketers. Similar to a Honey Trap. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Fear&amp;diff=395</id>
		<title>Fear</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Fear&amp;diff=395"/>
		<updated>2024-07-30T05:12:52Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Fear  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Using fear to gain target compliance. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-266 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Vulnerability &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Multipliers:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;D...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Fear  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using fear to gain target compliance. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-266 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; An attacker leverages fear to gain target compliance. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Need_%26_Greed_Attack&amp;diff=394</id>
		<title>Need &amp; Greed Attack</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Need_%26_Greed_Attack&amp;diff=394"/>
		<updated>2024-07-30T05:12:24Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Need &amp;amp; Greed Attack  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The attacker leverages &amp;#039;needs and greed&amp;#039; to manipulate the target. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-267 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Exploit &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Need &amp;amp; Greed Attack  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The attacker leverages &#039;needs and greed&#039; to manipulate the target. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-267 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The social engineer collects information on the target&#039;s needs and greeds, and then leverages these when launching the attack. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Need&amp;diff=393</id>
		<title>Need</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Need&amp;diff=393"/>
		<updated>2024-07-30T05:11:55Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Need  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  When an individual experiences a severe need to fulfill a requirement (emotional, financial, hunger, survival). &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-268 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Vulnerability &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Need  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  When an individual experiences a severe need to fulfill a requirement (emotional, financial, hunger, survival). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-268 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; When an individual experiences a severe need to fulfill a requirement (emotional, financial, hunger, survival) that individual is vulnerable to exploit. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Neoteny&amp;diff=392</id>
		<title>Neoteny</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Neoteny&amp;diff=392"/>
		<updated>2024-07-30T05:11:26Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Neoteny  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The prefence for infantile features. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-269 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Vulnerability &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Multipliers:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Neoteny  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The prefence for infantile features. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-269 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The prefence for things having infantile features. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Operant_Conditioning&amp;diff=390</id>
		<title>Operant Conditioning</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Operant_Conditioning&amp;diff=390"/>
		<updated>2024-07-30T05:10:52Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Operant Conditioning  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A behavioral conditioning process by which behavior is either reinforced or punished. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-270 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Exploit &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Operant Conditioning  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A behavioral conditioning process by which behavior is either reinforced or punished. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-270 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A behavioral conditioning process by which behavior is either reinforced or punished as a path to learning. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Accomplished_Introduction&amp;diff=388</id>
		<title>Accomplished Introduction</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Accomplished_Introduction&amp;diff=388"/>
		<updated>2024-07-30T05:10:22Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Accomplished Introduction  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A pick-up-artist (PUA) technique of using a Wing to facilitate an introduction with a statement. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-271 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Accomplished Introduction  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A pick-up-artist (PUA) technique of using a Wing to facilitate an introduction with a statement. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-271 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A pick-up-artist (PUA) technique of using a Wing to facilitate an introduction with a statement that indicates that the PUA is of high-value. This leverages both Social Proof and the Halo Effect.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Active_Indicator_Probe&amp;diff=386</id>
		<title>Active Indicator Probe</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Active_Indicator_Probe&amp;diff=386"/>
		<updated>2024-07-30T05:09:46Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Active Indicator Probe  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The introduction of a probe intended to elicit a response from a target under investigation. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-272 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Conc...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Active Indicator Probe  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The introduction of a probe intended to elicit a response from a target under investigation. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-272 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The introduction of a probe intended to elicit a response from a target under investigation.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Anchor-NLP_Technique&amp;diff=385</id>
		<title>Anchor-NLP Technique</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Anchor-NLP_Technique&amp;diff=385"/>
		<updated>2024-07-30T05:09:15Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Anchor-NLP Technique  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Neuro-Linguistic Programming technique to create an emotional connection with a non-threatening physical touch. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-273 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Anchor-NLP Technique  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Neuro-Linguistic Programming technique to create an emotional connection with a non-threatening physical touch. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-273 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Neuro-Linguistic Programming technique to create an emotional connection with a non-threatening physical touch. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Baiting-Trolling&amp;diff=383</id>
		<title>Baiting-Trolling</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Baiting-Trolling&amp;diff=383"/>
		<updated>2024-07-30T05:08:42Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Baiting-Trolling  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Attacker posts a provocative statement or material on social media intending to provoke an over reaction. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-274 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely R...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Baiting-Trolling  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Attacker posts a provocative statement or material on social media intending to provoke an over reaction. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-274 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The internet troll posts a provocative statement or material on social media with the intention of eliciting a response from an affected (usually offended) party. Often these responses provide a form of entertainment for the troll.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Brushing&amp;diff=381</id>
		<title>Brushing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Brushing&amp;diff=381"/>
		<updated>2024-07-30T05:08:08Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Brushing  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A deceptive technique used by e-commerce vendors to boost their ratings using fake orders. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-275 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8, 9 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Brushing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A deceptive technique used by e-commerce vendors to boost their ratings using fake orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-275 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8, 9 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A deceptive technique used by e-commerce vendors to boost their ratings on commerce platforms by creating fake orders (which are actually sent to customers) and then submitting false product reviews.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Buscador&amp;diff=378</id>
		<title>Buscador</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Buscador&amp;diff=378"/>
		<updated>2024-07-30T05:07:38Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Buscador  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  An OSINT focused Virtual Machine image for investigation and analysis. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-276 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Tool / TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Multipliers:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Buscador  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  An OSINT focused Virtual Machine image for investigation and analysis. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-276 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Tool / TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A Virtual Machine image (OVA format) developed by Mike Bazzel and David Wescott that includes preinstalled tools and scripts for conducting Open Source Intelligence (OSINT) investigations and analysis. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Cold_Reading&amp;diff=376</id>
		<title>Cold Reading</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Cold_Reading&amp;diff=376"/>
		<updated>2024-07-30T05:07:04Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Cold Reading  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The tactic of appearing to make true statements about a person they do not know. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-277 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mec...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Cold Reading  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The tactic of appearing to make true statements about a person they do not know. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-277 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The tactic of appearing to make true statements about a person they do not know personally.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Conversational_Threading&amp;diff=375</id>
		<title>Conversational Threading</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Conversational_Threading&amp;diff=375"/>
		<updated>2024-07-30T05:06:32Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Conversational Threading  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Leverages natural conversational &amp;quot;threads&amp;quot; in the opening and closing of conversations. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-278 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Conversational Threading  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Leverages natural conversational &amp;quot;threads&amp;quot; in the opening and closing of conversations. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-278 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Leverages natural conversational &amp;quot;threads&amp;quot; of the opening and closing of conversations. Opening new conversational threads provides the social engineer with the flexibility and option of revisiting unfinished threads, giving the impression of spontaneous and engaging conversation. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Deception-in-Depth&amp;diff=371</id>
		<title>Deception-in-Depth</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Deception-in-Depth&amp;diff=371"/>
		<updated>2024-07-30T05:04:49Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Deception-in-Depth  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Attackers simultaneously launch multiple disinformation campaigns to add layers of deception. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-279 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8, 9 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Operational &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Deception-in-Depth  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Attackers simultaneously launch multiple disinformation campaigns to add layers of deception. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-279 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8, 9 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Operational &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Attackers simultaneously launch multiple disinformation campaigns to add layers of deception in an effort to distract from their intended target, objective, or prevent attribution.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Double_Switch&amp;diff=369</id>
		<title>Double Switch</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Double_Switch&amp;diff=369"/>
		<updated>2024-07-30T05:04:18Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Double Switch  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Attackers deliberately target, and attempt to compromise, verified social media accounts with the intention of impersonating that individual. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-280 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8, 9 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Des...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Double Switch  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Attackers deliberately target, and attempt to compromise, verified social media accounts with the intention of impersonating that individual. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-280 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8, 9 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Attackers deliberately target, and attempt to compromise, verified social media accounts with the intention of impersonating well-known accounts on the social media platform.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Eject_with_Explanation&amp;diff=368</id>
		<title>Eject with Explanation</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Eject_with_Explanation&amp;diff=368"/>
		<updated>2024-07-30T05:03:47Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Eject with Explanation  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A technique for ending a conversation that is not going well while maintaining social status. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-281 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Eject with Explanation  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A technique for ending a conversation that is not going well while maintaining social status. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-281 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A technique for ending a conversation that is not going well while maintaining social status. Can be combined with an open conversation thread to induce a need for closure in the target. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=False_Flag&amp;diff=365</id>
		<title>False Flag</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=False_Flag&amp;diff=365"/>
		<updated>2024-07-30T05:03:15Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;False Flag  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The deliberate use of artifacts to disguise one&amp;#039;s affiliation. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-282 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Multip...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;False Flag  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The deliberate use of artifacts to disguise one&#039;s affiliation. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-282 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The deliberate use of artifacts to disguise one&#039;s affiliation.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=False_Time_Constraint&amp;diff=363</id>
		<title>False Time Constraint</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=False_Time_Constraint&amp;diff=363"/>
		<updated>2024-07-30T05:02:44Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;False Time Constraint  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The tactic of opening a conversation with a statement referencing a need to leave soon. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-283 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;False Time Constraint  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The tactic of opening a conversation with a statement referencing a need to leave soon. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-283 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The tactic of opening a conversation with a statement referencing a need to leave soon. For example &amp;quot;I&#039;ve only got a minute, but I want to get your opinion on...&amp;quot; This is intended to put the target at ease by informing them that the social engineer will not be consuming much of their time.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Firehose_of_Falsehood&amp;diff=361</id>
		<title>Firehose of Falsehood</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Firehose_of_Falsehood&amp;diff=361"/>
		<updated>2024-07-30T05:02:07Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Firehose of Falsehood  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Disinformation actors release a high number of false narratives across multiple channels to overwhelm target. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-284 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Operational &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Clos...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Firehose of Falsehood  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Disinformation actors release a high number of false narratives across multiple channels to overwhelm target. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-284 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Operational &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Disinformation actors release a high number of false narratives across multiple channels and platforms in an attempt to overwhelm audiences and distract from undesired messaging.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Forcing&amp;diff=359</id>
		<title>Forcing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Forcing&amp;diff=359"/>
		<updated>2024-07-30T05:01:28Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Forcing  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A category of techniques used by magicians to guide audience attention. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-285 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Well-Established &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Exploit &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Forcing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A category of techniques used by magicians to guide audience attention. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-285 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A category of techniques used by magicians to guide audience attention. (Malin et al, 2017 p.35) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Functional_Opener&amp;diff=357</id>
		<title>Functional Opener</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Functional_Opener&amp;diff=357"/>
		<updated>2024-07-30T05:00:38Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Functional Opener  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A technique for starting a conversation in a non-threatening manner by asking a question in reference to a required function. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-286 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Functional Opener  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A technique for starting a conversation in a non-threatening manner by asking a question in reference to a required function. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-286 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A technique for starting a conversation in a non-threatening manner by asking a question in reference to a required function, such as need to find a pet store.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Honey_Channels&amp;diff=355</id>
		<title>Honey Channels</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Honey_Channels&amp;diff=355"/>
		<updated>2024-07-30T04:59:37Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Honey Channels  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The continued flow of deceptive information to a potential attacker for the purpose of maintaining engagement. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-287 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Operational &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Re...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Honey Channels  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The continued flow of deceptive information to a potential attacker for the purpose of maintaining engagement. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-287 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Operational &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The continued flow of deceptive information to a potential attacker for the purpose of maintaining their engagement with a honeypot. Honey channels may represent a data stream which appears to be legitimate traffic, but is in fact a deception.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Hot_Reading&amp;diff=353</id>
		<title>Hot Reading</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Hot_Reading&amp;diff=353"/>
		<updated>2024-07-30T04:59:05Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Hot Reading  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A tactic similar to Cold Reading except that information is directly gleened from target. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-288 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mecha...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Hot Reading  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A tactic similar to Cold Reading except that information is directly gleened from target. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-288 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A tactic similar to Cold Reading except that the social engineer uses information directly gleened from the target to facilitate the reading.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Ice_Breaker&amp;diff=350</id>
		<title>Ice Breaker</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Ice_Breaker&amp;diff=350"/>
		<updated>2024-07-30T04:58:19Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Ice Breaker  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A technique for opening a conversation in a non-threatening manner to lower a target&amp;#039;s resistance. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-289 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Ice Breaker  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A technique for opening a conversation in a non-threatening manner to lower a target&#039;s resistance. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-289 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A technique for opening a conversation in a non-threatening manner to lower a target&#039;s resistance to talking and encourage further conversation.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Journobaiting&amp;diff=334</id>
		<title>Journobaiting</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Journobaiting&amp;diff=334"/>
		<updated>2024-07-30T04:42:39Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Journobaiting  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Internet trolls attempt to convince journalists of incorrect information or a false story. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-290 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Journobaiting  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Internet trolls attempt to convince journalists of incorrect information or a false story. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-290 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Internet trolls attempt to convince journalists of incorrect information or a false story.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Leading_Question&amp;diff=333</id>
		<title>Leading Question</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Leading_Question&amp;diff=333"/>
		<updated>2024-07-30T04:42:10Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Leading Question  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A technique used to shape the target&amp;#039;s attention and perspective. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-291 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;b...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Leading Question  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A technique used to shape the target&#039;s attention and perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-291 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A technique used to shape the target&#039;s attention and perspective on the topic of the question and to elicit a desired answer. Leading questions are used both to elicit specific responses and to influence an individual&#039;s perspective on the topic.   &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Maltego&amp;diff=331</id>
		<title>Maltego</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Maltego&amp;diff=331"/>
		<updated>2024-07-30T04:41:42Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Maltego  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  An open-source intelligence (OSINT) software tool that facilitates open source data discovery and visualization. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-292 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Tool / TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Maltego  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  An open-source intelligence (OSINT) software tool that facilitates open source data discovery and visualization. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-292 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Tool / TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; An open-source intelligence (OSINT) software tool that facilitates open source data discovery and visualization. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Micro_Expression&amp;diff=324</id>
		<title>Micro Expression</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Micro_Expression&amp;diff=324"/>
		<updated>2024-07-30T04:36:00Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Micro Expression  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A subtle and extremely brief facial expression that can &amp;quot;leak&amp;quot; a suppressed emotion. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-293 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Vulnerability &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Micro Expression  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A subtle and extremely brief facial expression that can &amp;quot;leak&amp;quot; a suppressed emotion. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-293 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A subtle and extremely brief facial expression that can &amp;quot;leak&amp;quot; a suppressed emotion.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Mirroring&amp;diff=322</id>
		<title>Mirroring</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Mirroring&amp;diff=322"/>
		<updated>2024-07-30T04:35:31Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Mirroring  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The social engineer mimicks target word choices, body language, or demeanor to build rapport. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-294 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mec...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Mirroring  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The social engineer mimicks target word choices, body language, or demeanor to build rapport. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-294 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The social engineer mimicks the word choices, body language, demeanor, or other aspects of a target as a means of building rapport with them.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Multi-Channel_Attack&amp;diff=320</id>
		<title>Multi-Channel Attack</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Multi-Channel_Attack&amp;diff=320"/>
		<updated>2024-07-30T04:34:59Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Multi-Channel Attack  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Scammers use multiple channels to enhance the credibility or believability of their pretext or scam. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-295 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Re...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Multi-Channel Attack  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Scammers use multiple channels to enhance the credibility or believability of their pretext or scam. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-295 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Scammers use multiple channels to enhance the credibility or believability of their pretext or scam.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Negging&amp;diff=319</id>
		<title>Negging</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Negging&amp;diff=319"/>
		<updated>2024-07-30T04:34:27Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Negging  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A pick-up-artist (PUA) technique of making fun of, or teasing, the target. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-296 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mu...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Negging  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A pick-up-artist (PUA) technique of making fun of, or teasing, the target. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-296 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A pick-up-artist (PUA) technique of making fun of, or teasing, the target as a means of establishing dominance or equal social footing.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Open-Ended_Question&amp;diff=304</id>
		<title>Open-Ended Question</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Open-Ended_Question&amp;diff=304"/>
		<updated>2024-07-30T04:25:29Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Open-Ended Question  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A question that is designed to elicit a richer response than a simple binary yes/no. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-297 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Me...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Open-Ended Question  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A question that is designed to elicit a richer response than a simple binary yes/no. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-297 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A question that is designed to elicit a richer response than a simple binary yes/no. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Pendant_Anchoring&amp;diff=303</id>
		<title>Pendant Anchoring</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Pendant_Anchoring&amp;diff=303"/>
		<updated>2024-07-30T04:25:00Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Pendant Anchoring  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A pick-up-artist (PUA) technique of loaning something of perceived value (such as a pendant) as a pretext for a follow up meeting. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-298 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Pendant Anchoring  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A pick-up-artist (PUA) technique of loaning something of perceived value (such as a pendant) as a pretext for a follow up meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-298 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A pick-up-artist (PUA) technique of giving something of perceived value (such as a pendant) with the expectation of getting it back as a way to increasing the target&#039;s investment in the PUA and providing a pretext for meeting again at a later time. This is often presented as a loan.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Preloading&amp;diff=301</id>
		<title>Preloading</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Preloading&amp;diff=301"/>
		<updated>2024-07-30T04:24:33Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Preloading  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A Neuro-Linguistic term for preparing a target to be in a more persuadable state. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-299 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Preloading  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A Neuro-Linguistic term for preparing a target to be in a more persuadable state. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-299 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A Neuro-Linguistic term for preparing a target to be in a more persuadable state by employing cues or props.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Prop&amp;diff=286</id>
		<title>Prop</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Prop&amp;diff=286"/>
		<updated>2024-07-30T04:05:30Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Prop  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Use of a third party referent (usually and inanimate object) as a conversation starter. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-300 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Prop  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Use of a third party referent (usually and inanimate object) as a conversation starter. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-300 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Use of a third party referent (usually and inanimate object) as a conversation starter. The social engineer employs the prop to provide the context for a conversation. A third party referent could also be a pet, a person, or an event that generates conversation.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Reframing&amp;diff=283</id>
		<title>Reframing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Reframing&amp;diff=283"/>
		<updated>2024-07-30T04:04:55Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Reframing  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Reorienting the target&amp;#039;s perspective or impression (frame) of a situation, circumstance, or relationship. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-301 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Reframing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Reorienting the target&#039;s perspective or impression (frame) of a situation, circumstance, or relationship. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-301 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Reorienting the target&#039;s perspective or impression (frame) of a situation, circumstance, or relationship.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Sandbagging&amp;diff=281</id>
		<title>Sandbagging</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Sandbagging&amp;diff=281"/>
		<updated>2024-07-30T04:04:15Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Sandbagging  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Deliberately projecting weakness when actually in a position of strength. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-302 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Sandbagging  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Deliberately projecting weakness when actually in a position of strength. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-302 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Deliberately projecting weakness when actually in a position of strength. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Slander_Attack&amp;diff=280</id>
		<title>Slander Attack</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Slander_Attack&amp;diff=280"/>
		<updated>2024-07-30T04:03:24Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Slander Attack  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Employing multiple false accounts to flood seller with complaints to overwhelm them. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-303 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Operational &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Observed in the Wild &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Slander Attack  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Employing multiple false accounts to flood seller with complaints to overwhelm them. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-303 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Operational &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Employing multiple false accounts to flood seller with complaints to overwhelm them.  (Malin et al, 2017 p.146) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Social_Engineering_Toolkit&amp;diff=278</id>
		<title>Social Engineering Toolkit</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Social_Engineering_Toolkit&amp;diff=278"/>
		<updated>2024-07-30T04:02:47Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Social Engineering Toolkit  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A platform designed to facilitate social engineering attacks for penetration testers. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-304 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Tool / TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanis...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Social Engineering Toolkit  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A platform designed to facilitate social engineering attacks for penetration testers. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-304 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Tool / TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A platform designed to facilitate social engineering attacks for penetration testers. Written by David Kennedy (ReL1K) with help from the security community. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Tainted_Leak&amp;diff=276</id>
		<title>Tainted Leak</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Tainted_Leak&amp;diff=276"/>
		<updated>2024-07-30T04:02:15Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Tainted Leak  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Disinformation actors release selectively edited, or falsified, non-public information in a data-leak. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-305 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Operational &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Tainted Leak  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Disinformation actors release selectively edited, or falsified, non-public information in a data-leak. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-305 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Operational &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Disinformation actors release selectively edited, or falsified, non-public information in a data-leak.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Trance-Words&amp;diff=270</id>
		<title>Trance-Words</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Trance-Words&amp;diff=270"/>
		<updated>2024-07-30T04:00:02Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Trance-Words  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  A Neuro-Linguistic Programming technique that employs repeated words or phrases that are affectively &amp;quot;anchored&amp;quot;. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-306 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concep...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Trance-Words  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A Neuro-Linguistic Programming technique that employs repeated words or phrases that are affectively &amp;quot;anchored&amp;quot;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-306 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A Neuro-Linguistic Programming technique that employs repeated words or phrases that are &amp;quot;anchored&amp;quot; with affective conditions desired by the social engineer to induce an association between the words and the desired affect.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Venue_Change&amp;diff=264</id>
		<title>Venue Change</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Venue_Change&amp;diff=264"/>
		<updated>2024-07-30T03:43:51Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Venue Change  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The social engineer moves the social engagement to multiple venues to contextualilze memories, thus creating time distortion. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-307 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  TTP &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely R...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Venue Change  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The social engineer moves the social engagement to multiple venues to contextualilze memories, thus creating time distortion. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-307 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The social engineer moves the social engagement to multiple venues to contextualilze memories within each and thus creating time distortion of extended engagement for the purpose of increasing investment in the relationship and engagement.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Whorfian_Attack&amp;diff=263</id>
		<title>Whorfian Attack</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Whorfian_Attack&amp;diff=263"/>
		<updated>2024-07-30T03:43:01Z</updated>

		<summary type="html">&lt;p&gt;EE: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Whorfian Attack  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  The deliberate attempt to control thought through the restriction of language, words, or speech. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-308 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Strategic &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Theoretical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Exploit &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Whorfian Attack  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  The deliberate attempt to control thought through the restriction of language, words, or speech. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-308 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Strategic &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Theoretical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; The deliberate attempt to control through the restriction of language, words, speech, or controls on discussion of topics. This may be carried out through censorship, memory holing, shadow banning, redfining, or other means.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>EE</name></author>
	</entry>
</feed>