The NATO Strategic Communications Centre of Excellence published a report on the challenges governments face with online security, and Wired managed to spot a particular interesting experiment within the multi-section report. As part of an experiment, the independent NATO organization used Facebook to to try to manipulate soldiers during a military exercise. Over several weeks, the researchers posted fake webpages and groups, promoted them with targeted advertising, and gradually lured members of the military exercise into them. Eventually, the researcher were able to identify "a significant amount of people taking part in the exercise and managed to identify all members of certain units, pinpoint the exact locations of several battalions, gain knowledge of troop movements to and from the exercises, and discover the dates and active phases of the exercises." The researchers note that several of Facebook's existing countermeasures were effective, but they weren't enough to stop the researchers from effectively infiltrating the exercise. The researchers also tracked down service members' Instagram and Twitter accounts and searched for other information available online, some of which a bad actor might be able to exploit. "We managed to find quite a lot of data on individual people, which would include sensitive information," Biteniece says. "Like a serviceman having a wife and also being on dating apps" "Every person has a button. For somebody there's a financial issue, for somebody it's a very appealing date, for somebody it's a family thing," Sarts says. "It's varied, but everybody has a button. The point is, what's openly available online is sufficient to know what that is."