Creating the appearance of an accidental or purposeful leakage of information (document, letter, correspondence archive, etc.) is actively used to disguise an information operation. Allegedly, hackers stole something and posted it. Or an unknown well-wisher, seeing the imperfection of this world, became disillusioned with life and thus decided to restore justice. Or a sleepy c 27 ommunications officer forgot his laptop at a public transport stop….
And somewhere on the Internet, there is such a leak. Users see this and the first thing that the subconscious mind implicitly slips into the user is the idea that since it has flown away, they apparently don’t really worry about the confidentiality of their information, and even more so they will not give a damn about someone else’s. This is how the initial formation of a negative attitude begins. Then, the user begins to read the leaked material and, delving into the essence of what is written, exacerbates his negative perception. Otherwise, why would this leak be organized?
Be very careful when using data from such leaks. Any such leaks of information are done for something, which means that the manipulator is interested in achieving this goal. Given the anonymity in such events, there is a temptation to “enhance the effect” by additionally focusing on something (at least). They make it simple.
Imagine that some attacker copied a couple of thousand letters from a certain mailbox and plans to put it on public display. This attacker knows the exact format and design of the items, the style of the authors, and the peculiarities of their communication. It creates another file with a non-existent letter. This letter exactly repeats in appearance and stylistic the letters of the sender, under which the attacker mimics and contains even more toxic information, but does not exist. At its core, this is disinformation, and it is impossible to build any direct forecasts based on it.
