Disruption Workflows
The Disruption Workflows are step-by-step operational guides for countering six specific types of influence operations:
- Coordinated inauthentic behavior
- Deepfakes and manipulated content
- Impersonation
- Sanctions circumvention
- Doxxing
- Gendered smear campaigns targeting political candidates
Each workflow selects and sequences disruption measures from the Framework, detailing who should act, what tools to use, and when to intervene, from evidence gathering to disruption and mitigation. They are modular, so organisations can adapt them to their national legal and institutional contexts.


Localisation Note
The Workflows adapt to national legal and institutional frameworks and map the national defenders' community capabilities. The Workflows specify who to contact, which laws to use, and what resources to leverage. The Workflows are currently localised for Poland, the Czech Republic, Romania, and Bulgaria.
Need a version for your country? We localise for new jurisdictions - contact us to discuss funding and collaboration.
Thank you to partners AMO, PSSI, CSD, CEEDDW, Expert Forum, and ESGA who contributed to the creation of the localised workflows.

