{"title":"Cyber influence defense: Applying the DISARM framework to a cognitive hacking case from the Romanian digital space","authors":"Alina Bârgăoanu, Mihaela Pană","doi":"10.60097/acig/190196","DOIUrl":null,"url":null,"abstract":"One of the main lessons learned in the context of Russia’s\nfull-scale invasion of Ukraine starting in February 2022 is that for-\neign information manipulation and interference (FIMI) operations\nare closely coupled with cyber threats. Regardless of whether\ncyberattacks are followed by an information manipulation compo-\nnent and vice versa, the merger of the two can be an early indica-\ntor of the potential for a conflict to escalate from the cyber area\nto the ground. Our article is premised on the idea that today’s\nhighly technologised information ecosystem is a fertile ground for\ncyberattacks and information manipulation in the context of FIMI;\nmore specifically, it enables cognitive hacking, meaning hacking\nthe human mind and human cognition altogether through techno-\nlogical disruption and cyber pressure. Starting from this premise,\nthe aim of the article is to highlight the technological determi-\nnants of cognitive hacking and identify silent or emerging threats\nthat bypass technological sensors and seek to disrupt and manip-\nulate the information environment. The empirical part is based on observation as a descriptive method, which is used to analyse\na case of cognitive hacking carried out via a YouTube malvertis-\ning campaign targeting Romanian users. This case study is anal-\nysed qualitatively by matching the DISinformation Analysis & Risk\nManagement (DISARM) framework with evidence collected through\nOpen-Source Intelligence (OSINT) tools, following an innovative\nanalysis structured according to the purposes, actions, results and\ntechniques (PART) model. The extensive analysis of the identified\ncase shows that applying the DISARM framework to cyber-enabled\noperations can be useful for anticipating and responding to FIMI\nthreats, even when such operations do not appear to have a spe-\ncific, immediately identifiable purpose.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"23 8","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Cybersecurity & Internet Governance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.60097/acig/190196","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the main lessons learned in the context of Russia’s
full-scale invasion of Ukraine starting in February 2022 is that for-
eign information manipulation and interference (FIMI) operations
are closely coupled with cyber threats. Regardless of whether
cyberattacks are followed by an information manipulation compo-
nent and vice versa, the merger of the two can be an early indica-
tor of the potential for a conflict to escalate from the cyber area
to the ground. Our article is premised on the idea that today’s
highly technologised information ecosystem is a fertile ground for
cyberattacks and information manipulation in the context of FIMI;
more specifically, it enables cognitive hacking, meaning hacking
the human mind and human cognition altogether through techno-
logical disruption and cyber pressure. Starting from this premise,
the aim of the article is to highlight the technological determi-
nants of cognitive hacking and identify silent or emerging threats
that bypass technological sensors and seek to disrupt and manip-
ulate the information environment. The empirical part is based on observation as a descriptive method, which is used to analyse
a case of cognitive hacking carried out via a YouTube malvertis-
ing campaign targeting Romanian users. This case study is anal-
ysed qualitatively by matching the DISinformation Analysis & Risk
Management (DISARM) framework with evidence collected through
Open-Source Intelligence (OSINT) tools, following an innovative
analysis structured according to the purposes, actions, results and
techniques (PART) model. The extensive analysis of the identified
case shows that applying the DISARM framework to cyber-enabled
operations can be useful for anticipating and responding to FIMI
threats, even when such operations do not appear to have a spe-
cific, immediately identifiable purpose.