Develop social network persona digital footprint
Both newly built personas and pre-compromised personas may require development of additional documentation to make them seem real. This could include filling out profile information, developing social networks, or incorporating photos.   
Tactic: Persona Development
DetectionDetectable by Common Defenses (Yes/No/Partial): No
Explanation: Unless there is some threat intelligence reporting, these users are hard to differentiate.
Difficulty for the AdversaryEasy for the Adversary (Yes/No): Yes
Explanation: The only difference between an adversary conducting this technique and a typical user, is the adversary's intent - to target an individual for compromise.
- Mike Lennon. (2014, May 29). Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation. Retrieved March 1, 2017.
- Thomas Ryan. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017.
- Joan Goodchild. (2010, July 8). The Robin Sage experiment: Fake profile fools security pros. Retrieved March 6, 2017.