6D Attack Methodology

6D Attack Methodology Banner Image

A strategic, sequential framework used by adversaries to undermine digital systems:

  • Discover – Find major data centers and substations (e.g., weather balloons, drones with hyperspectral sensors)

  • Disturb – Confirm digital systems in identified facilities (e.g., neutron rays, DEWs)

  • Disrupt – Undermine confidence, cause minor outages (e.g., directed EMPs)

  • Disable – Eliminate key digital dependencies (e.g., cloud infrastructure, network assets)

  • Destroy – Cause physical damage to infrastructure (e.g., Kessler Cascade)

  • Displace – Disrupt civilian focus via targeted chaos (e.g., drone swarms)

Related Terms

Digital Infrastructure Terms