You deploy harassment and coordinated inauthentic behavior to suppress credible voices and dominate information environments.