ISR Concepts
APT Key Terms
Collection Requirements Cycle
APT Attack Phases
ISR Optimization Steps
100

This strategy may be the only option in a resource constrained or contested environment or during an integrated deterrence mission.

What is single source?

100

This malicious software allows attackers remote control over a compromised system, enabling data theft, surveillance, and further exploitation.

What are RATs?

100

This phase of the cycle identifies intelligence gaps and targets, production and/or submission of collection requirements.

What is a Request?

100

During this phase of the attack, adversaries expand control over the network using stolen credentials and token theft IOT gain domain admin privileges.

What is privilege escalation & lateral movement?

100

During this step, collection requests flow through the collection management process, the staffs communicate with HHQ to ensure they are accurately prioritized since some collection plans are complex and may require one collection to satisfy another.

What is Communicate?

200

This concept is used when the probability of mission success using one asset, with a certain capability, is low.

What is redundancy?

200

This is a targeted attack wherein adversaries compromise websites frequently visited by their victims IOT inject malware to specific organizations.

What is a watering hole attack?

200

This phase involves reporting or distributing relevant information to commanders, staffs, and other consumers.

What is dissemination?

200
The objective of this phase is to maintain long-term access without detection, by deploying custom malware (RATs, web shells, backdoors) or legitimate tools like PowerShell, WMI, or Mimikatz.

What is establishing persistence?

200

In this step, after tracking collection requirements, the supported unit staffs and asset mission planners reach out to each other to perform more robust pre-mission coordination, allowing for adjustments to the collection activity prior to execution of the ISR mission.

What is refine?

300

This concept involves mixing different collection capabilities, with different requirements by overlapping, in time, within a defined geographic area. This achieves synergies in satisfying collection requirements.

What is layering?

300

When this protocol is poorly configured, it allows APT groups opportunities to exploit weakness to gain initial access to systems without being in the same area.

What is RDP?

300

In this phase, data is converted into a suitable format and transformed into information that can be readily used.

What is Exploit?

300

During this phase of the APT attack, adversaries attempt to gather intelligence about their targets before launching their offensive, often through OSINT avenues such as LinkedIn, company websites, or social media.

What is reconnaissance & target selection?

300

This step involves supporting units, which take direction from the supported unit, reach out for the current operations status, and provide input on current capabilities and limitations.

What is direct?

400

These collection techniques leverage numerous collection assets and capabilities against a known target set. They are usually conducted over a multi-day time period. The intent is to maximize the information collected over a specific period.

What is ISR soak/massing?

400

This cyberattack method uses stolen usernames and passwords (typically from breaches) to automatically test against various websites to gain access.

What is credential stuffing?

400

In this phase requests are evaluated and triaged against one another.

What is prioritization?

400

During this phase of the attack, adversaries may disable security logs, delete forensic evidence, or manipulate time stamps to obfuscate their presence.

What is covering tracks & maintaining access?

400

During this step the supported unit staffs fuse the collected information back into the planning cycle, which maximizes the impact of the entire process.

What is integrate?

500

This concept is an exchange of data between collection sensors or assets which drive additional collection from other sensors or assets on the same target leading to higher confidence reporting than a single asset can provide. There are two types: internal and external.

What is cross-cueing?

500

This malware enables nonstandard, cover, remote access IOT steal data and maintain persistent control over the compromised system.

What is a keyplug backdoor?

500

This phase involves Collection Operations Management (COM) authority tasks assets according to collection requirements.

What is task?

500

During this phase of the APT attack, adversaries often compress the desired data before sending it to external servers using channels such as dropbox, google drive, or GitHub.

What is data exfiltration & mission execution?

500

This step is after collection, when the supported unit staffs and PED units collaborate, ensuring the initial requirement has not changed and the requested ISR product will satisfy the requirement.

What is coordinate?