Security teams looking to understand and characterize malign influence operations must pick from a range of different models aiming to do for disinformation what Lockheed Martin鈥檚 Cyber Kill Chain and MITRE鈥檚 ATT&CK Framework have done for cyber threats. Some tools feature 鈥渒ill chain鈥 in their names, and one looks especially like ATT&CK: DISARM has a grid that catalogs adversarial tactics, techniques, and procedures (TTPs) for disinformation campaigns. How do all these tools compare?
These competing models鈥 differences, similarities, pros, and cons are not always intuitive, especially when the names sound similar. We鈥檝e assembled this primer to help cybersecurity and cognitive security professionals build a shared awareness of these tools, including the advantages and disadvantages of specific models when countering tomorrow鈥檚 threats. It鈥檚 in the form of an FAQ, so you can start up top if you鈥檙e brand new to kill chains or jump in where appropriate based on your existing knowledge.