A strategic, sequential framework used by adversaries to undermine digital systems:
- Discover – Find major data centers and substations (e.g., weather balloons, drones with hyperspectral sensors)
- Disturb – Confirm digital systems in identified facilities (e.g., neutron rays, DEWs)
- Disrupt – Undermine confidence, cause minor outages (e.g., directed EMPs)
- Disable – Eliminate key digital dependencies (e.g., cloud infrastructure, network assets)
- Destroy – Cause physical damage to infrastructure (e.g., Kessler Cascade)
- Displace – Disrupt civilian focus via targeted chaos (e.g., drone swarms)
Source: Section III, “The ‘6D’ Attack Methodology”