6D Attack Methodology

6D Attack Methodology Banner Image

A strategic, sequential framework used by adversaries to undermine digital systems:

  1. Discover – Find major data centers and substations (e.g., weather balloons, drones with hyperspectral sensors)
  2. Disturb – Confirm digital systems in identified facilities (e.g., neutron rays, DEWs)
  3. Disrupt – Undermine confidence, cause minor outages (e.g., directed EMPs)
  4. Disable – Eliminate key digital dependencies (e.g., cloud infrastructure, network assets)
  5. Destroy – Cause physical damage to infrastructure (e.g., Kessler Cascade)
  6. Displace – Disrupt civilian focus via targeted chaos (e.g., drone swarms)

Source: Section III, “The ‘6D’ Attack Methodology”

Related Digital Infrastructure Terms

Digital Infrastructure Terms