Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
One of the main lessons learned in the context of Russia’s full-scale invasion of Ukraine starting in February 2022 is that foreign information manipulation and interference (FIMI) operations are closely coupled with cyber threats. Regardless of whether cyberattacks are followed by an information manipulation component and vice versa, the merger of the two can be an early indicator of the potential for a conflict to escalate from the cyber area to the ground. Our article is premised on the idea that today’s highly technologised information ecosystem is a fertile ground for cyberattacks and information manipulation in the context of FIMI; more specifically, it enables cognitive hacking, meaning hacking the human mind and human cognition altogether through technological disruption and cyber pressure. Starting from this premise, the aim of the article is to highlight the technological determinants of cognitive hacking and identify silent or emerging threats that bypass technological sensors and seek to disrupt and manipulate the information environment. The empirical part is based on observation as a descriptive method, which is used to analyse a case of cognitive hacking carried out via a YouTube malvertising campaign targeting Romanian users. This case study is analysed qualitatively by matching the DISinformation Analysis & Risk Management (DISARM) framework with evidence collected through Open-Source Intelligence (OSINT) tools, following an innovative analysis structured according to the purposes, actions, results and techniques (PART) model. The extensive analysis of the identified case shows that applying the DISARM framework to cyber-enabled operations can be useful for anticipating and responding to FIMI threats, even when such operations do not appear to have a specific, immediately identifiable purpose.
Czasopismo
Rocznik
Tom
Strony
91--121
Opis fizyczny
Bibliogr. 57 poz., fot., rys.
Twórcy
autor
- Faculty of Communication and Public Relations, National, University of Political Studies and Public Administration, Bucharest
autor
- National University of Political Studies and Public Administration, Bucharest
Bibliografia
- [1] A.K. Sood, R.J. Enbody, “Malvertising – exploiting web advertising,” Computer Fraud & Security, vol. 2011, no. 4, pp. 11–16, 2011, doi: 10.1016/ S1361-3723(11)70041-0.
- [2] C. Dwyer, A.A. Kanguri, “Malvertising – A rising threat to the online ecosystem,” Journal of Information Systems Applied Research (JISAR), vol. 10, p. 29, 2017.
- [3] M. Willett, “The cyber dimension of the Russia–Ukraine war,” Survival (Lond), vol. 64, no. 5, pp. 7–26, 2022, doi: 10.1080/00396338.2022.2126193.
- [4] K. Poireault. (Nov. 18, 2023). “Russian APT Sandworm disrupted power in Ukraine using novel OT techniques,” Infosecurity Magazine. [Online]. Available: https://www.infosecurity-magazine.com/news/russia-sandworm-disruptedpower. [Accessed: Jun. 25, 2023].
- [5] G. Pakharenko, “Cyber operations at Maidan: A first-hand account,” in Cyber War in Perspective: Russian Aggression against Ukraine, K. Geers, Ed. Tallinn: NATO–CCD-COE Publications, 2015, pp. 59-66. [Online]. Available: https://ccdcoe.org/uploads/2018/10/Ch07_CyberWarinPerspective_Pakharenko.pdf [Accessed: Jun. 25, 2023].
- [6] J. Przetacznik, S. Tarpova. (2022). Russia’s war on Ukraine: Timeline of cyberattacks. [Online]. Available: https://epthinktank.eu/2022/06/21/russias-war-onukraine-timeline-of-cyber-attacks. [Accessed: Jun. 25, 2023].
- [7] Microsoft. (2022). Defending Ukraine: Early lessons from the cyber war. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2022/06/22/defendingukraine-early-lessons-from-the-cyber-war. [Accessed: Apr. 11, 2023].
- [8] G. Wilde. (Dec. 12, 2022). Cyber operations in Ukraine: Russia’s unmet expectations. [Online]. Available: https://carnegieendowment.org/research/2022/12/cyber-operations-in-ukraine-russias-unmet-expectations?lang=en. [Accessed: Mar. 9, 2023].
- [9] A. MacDonald, R. Ratcliffe. (Nov. 18, 2023). Cognitive warfare: maneuvering in the human dimension. [Online]. Available: https://www.usni.org/magazines/proceedings/2023/April/cognitive-warfare-maneuvering-human-dimension. [Accessed: Dec. 03, 2023].
- [10] D. Susser, B. Roessler, H. Nissenbaum, “Online manipulation: Hidden influences in a digital world,” Georgetown Law Technology Review, vol. 1, pp. 1–45, 2019, doi: 10.2139/ssrn.3306006.
- [11] R. Medrano. (2023). Cognitive warfare: Halting the Russian sphere of influence. [Online]. Available: https://apps.dtic.mil/sti/trecms/pdf/AD1200752.pdf. [Accessed: Dec. 12, 2023].
- [12] Y. Danyk, C.M. Briggs, “Modern cognitive operations and hybrid warfare,” Journal of Strategic Security, vol. 16, no. 1, pp. 35–50, 2023, doi: 10.2307/48718245.
- [13] P. Krawczyk, J. Wiśnicki, “Russia’s social-impact operations in the context of cognitive warfare in Ukraine in 2022,” Cybersecurity and Law, vol. 9, no. 1, pp. 194–203, 2023, doi: 10.35467/cal/169315.
- [14] J.F. Tripp, N.K. Lankton, D.H. Mcknight, J. Tripp, “Technology, humanness, and trust: rethinking trust in technology,” Journal of the Association for Information Research, vol. 16, no. 10, pp. 880–918, 2015, doi: 10.17705/1jais.00411.
- [15] D.B. Hollis, “The influence of war; the war for influence,” Temple International & Comparative Law Journal, vol. 32, no. 1, pp. 31, 2018.
- [16] G. Cybenko, A. Giani, P. Thompson, “Cognitive hacking,” Advances in Computers, vol. 60, pp. 35–73, 2004, doi: 10.1016/S0065-2458(03)60002-1.
- [17] NATO Allied Command Transformation. (Nov. 18, 2023). Cognitive warfare: Strengthening and defending the mind. [Online]. Available: https://www.act.nato.int/article/cognitive-warfare-strengthening-and-defending-the-mind. [Accessed: Dec. 13, 2023].
- [18] A. Ertan, K.H. Floyd, P. Pernik, T. Stevens. (2020). Cyber threats and NATO 2030: Horizon scanning and analysis. [Online]. Available: https://ccdcoe.org/library/publications/cyber-threats-and-nato-2030-horizon-scanning-and-analysis. [Accessed: Jun. 25, 2023].
- [19] O. Backes, A. Swab. (2019). Cognitive warfare: The Russian threat to election integrity in the Baltic states. [Online]. Available: https://www.belfercenter.org/publication/cognitive-warfare-russian-threat-election-integrity-baltic-states. [Accessed: Dec. 23, 2023].
- [20] A. Bernal, C. Carter, I. Singh, K. Cao, O. Madreperla. (2020). Cognitive warfare: An attack on truth and thought. [Online]. Available: https://www.innovationhub-act.org/sites/default/files/2021-03/Cognitive%20Warfare.pdf. [Accessed: Nov. 18, 2023].
- [21] N. Beauchamp-Mustafaga, “Cognitive domain operations: The PLA’s new holistic concept for influence operations,” China Brief, vol. 19, no. 16, 2019. [Online]. Available: https://jamestown.org/program/cognitive-domain-operations-theplas-new-holistic-concept-for-influence-operations. [Accessed: Nov. 18, 2023].
- [22] L. Hauser, Coordinated chaos: Synchronized cyberwarfare and disinformation attacks. The Project on International Peace and Security. Williamsburg, VA: Global Research Institute, 2022.
- [23] R. Burda, Cognitive warfare as part of society never-ending battle for minds. Information-based behavioral influencing and Western practice paper series. The Hague: The Hague Centre for Strategic Studies, Jun 23, 2023.
- [24] M. Alazab, “Russia is using an onslaught of cyber attacks to undermine Ukraine’s defense capabilities,” The Conversation, 24 Feb. 2022. [Online]. Available: https://theconversation.com/russia-is-using-an-onslaught-of-cyberattacks-to-undermine-ukraines-defence-capabilities-177638. [Accessed: Mar. 30, 2022].
- [25] A. Wahlstrom, A. Revelli, S. Riddell, D. Mainor, R. Serabian. (2022). The IO offensive: Information operations surrounding the Russian invasion of Ukraine. [Online]. Available: https://www.mandiant.com/resources/blog/informationoperations-surrounding-ukraine. [Accessed: Nov. 18, 2023].
- [26] I. Yonat. (2023). Hostile influence campaigns, cyber security and AI. [Online]. Available: https://www.linkedin.com/posts/itai-y-5731a146_hostile-influencecampaigns-cyber-security-activity-7077365346583609344-44PL. [Accessed: Nov. 18, 2023].
- [27] D. Pereira. (2023). Cognitive infrastructure worldwide is under attack in “the worst cognitive warfare conditions since WWII.” [Online]. Available: https://www.oodaloop.com/archive/2023/11/08/cognitive-infrastructure-worldwide-is-underattack-in-the-worst-cognitive-warfare-conditions-since-wwii. [Accessed: Nov. 18, 2023].
- [28] B. Gourley. (2019). America’s most critical infrastructure is also our most neglected infrastructure. [Online]. Available: https://www.oodaloop.com/archive/2019/09/03/americas-most-critical-infrastructure-is-also-our-mostneglected-infrastructure. [Accessed: Nov. 18, 2023].
- [29] Swedish Psychological Defense Agency. (2023). [Online]. Available: https://www.mpf.se/en/about-us. [Accessed: Nov. 18, 2023].
- [30] Joint Research Centre EU. (2020). Cybersecurity, our digital anchor: A European perspective, Publications Office of the European Union, Luxembourg. [Online]. Available: https://publications.jrc.ec.europa.eu/repository/handle/JRC121051. [Accessed: Nov. 18, 2023].
- [31] A. Polyakova, S.P. Boyer, B.-R. Bosch. (2018). The future of political warfare: Russia, the West, and the coming age of global digital competition. [Online]. Available: https://www.brookings.edu/articles/the-future-of-political-warfarerussia-the-west-and-the-coming-age-of-global-digital-competition. [Accessed Mar. 30, 2022].
- [32] P.N. Petratos, “Misinformation, disinformation, and fake news: Cyber risks to business,” Business Horizons, vol. 64, no. 6, pp. 763–774, 2021, doi: 10.1016/j.bushor.2021.07.012.
- [33] US Department of State. (2020). GEC special report: Pillars of Russia’s disinformation and propaganda ecosystem. [Online]. Available: https://www.state.gov/russias-pillars-of-disinformation-and-propaganda-report. [Accessed: Mar. 30, 2022].
- [34] M. Baezner, Cyber and information warfare in the Ukrainian conflict. ETH Zürich: Center for Security Studies (CSS), 2018.
- [35] P. Brangetto, M. A. Veenendaal. (2016). “Influence cyber operations: The use of cyberattacks in support of influence operations.” 8th International Conference on Cyber Conflict, 2016, pp. 113–126. [Online]. Available: https://ccdcoe.org/uploads/2018/10/Art-08-Influence-Cyber-Operations-The-Use-of-Cyberattacksin-Support-of-Influence-Operations.pdf. [Accessed: Mar. 30, 2022].
- [36] European Union Agency for Cybersecurity – ENISA. (2021). ENISA threat landscape 2021. [Online]. Available: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021. [Accessed: Mar. 30, 2022].
- [37] European Commission. (Dec. 14, 2020). The EU’s cybersecurity strategy for the digital decade. [Online]. Available: https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0. [Accessed: Nov. 18, 2023].
- [38] Y. Danyk, T. Maliarchuk, C. Briggs, “Hybrid war: High-tech, information and cyber conflicts,” Connections: The Quarterly Journal, vol. 16, no. 2, pp. 5–24, 2017, doi: 10.11610/connections.16.2.01.
- [39] D. Ardia, E. Ringel, V. S. Ekstrand, A. Fox, “Addressing the decline of local news, rise of platforms, and spread of mis-and disinformation online: A summary of current research and policy proposals,” UNC Legal Studies Research Paper, 15 Jan. 2021. [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3765576. [Accessed: Nov. 18, 2023].
- [40] B. Martens, L. Aguiar, E. Gomez-Herrera, F. Mueller-Langer. (2018). The digital transformation of news media and the rise of disinformation and fake news – An economic perspective. [Online]. Available: https://ec.europa.eu/jrc. [Accessed: Nov. 18, 2023].
- [41] J.T. Rob, J.N. Shapiro. (Jun. 12, 2022). A brief history of online influence operations. [Online]. Available: https://www.lawfareblog.com/brief-history-onlineinfluence-operations. [Accessed: Nov. 18, 2023].
- [42] P. M. Duggan, “Strategic development of special warfare in cyberspace,” Joint Force Quarterly 79, vol. 79, no. 4, pp. 46–53, 2015.
- [43] C. Whyte, A. T. Thrall, B. M. Mazanec, Eds., Information warfare in the age of cyber conflict. London, UK, New York, NY, USA: Routledge Taylor & Francis Group, 2021.
- [44] C. Whyte, “Cyber conflict or democracy ‘hacked’?” How cyber operations enhance information warfare,” Journal of Cybersecurity, vol. 6, no. 1, 2020, pp. 1-17, doi: 10.1093/cybsec/tyaa013.
- [45] R. Manwaring, J. Holloway, “Resilience to cyber-enabled foreign interference: Citizen understanding and threat perceptions,” Defense Studies, vol. 23, no. 2, pp. 334–357, 2022, doi: 10.1080/14702436.2022.2138349.
- [46] M.A. Gomez, “Cyber-enabled information warfare and influence operations,” in Information warfare in the age of cyber conflict, C. Whyte, A.T. Thrall, B.M. Mazanec, Eds., London: Routledge Taylor & Francis, 2021, pp. 132–146.
- [47] M. Wigell, “Hybrid interference as a wedge strategy: A theory of external interference in liberal democracy,” International Affairs, vol. 95, no. 2, pp. 255–275, 2019, doi: 10.1093/ia/iiz018.
- [48] M. Weissmann, N. Nilsson, B. Palmertz, P. Thunholm, Eds., Hybrid warfare: Security and asymmetric conflict in international relations. London: I.B. Tauris, 2021.
- [49] M.E. Zurko, “Disinformation and reflections from usable security,” IEEE Security and Privacy, vol. 20, no. 3., pp. 4–7, 2022, doi: 10.1109/MSEC.2022.3159405.
- [50] I. Lella, M. Theocharidou, E. Tsekmezoglou, R. Svetozarov Naydenov, C. Ciobanu, A. Malatras. (2022). ENISA threat landscape 2022. [Online]. Available: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022 [Accessed: Aug. 20, 2023].
- [51] C. R. Walker, S.-J. Terp, P. C. Breuer, C. L. Crooks, “Misinfosec,” Companion Proceedings of The 2019 World Wide Web Conference. Association for Computing Machinery, May 13, pp. 1026–1032, 2019. doi: 10.1145/3308560.3316742.
- [52] DISARM Foundation. (Nov. 12, 2023). DISARM framework. [Online]. Available: https://www.disarm.foundation/framework. [Accessed: Nov. 18, 2023].
- [53] EU-US Trade and Technology Council. (May 31, 2023). Trade and Technology Council Fourth Ministerial – Annex on foreign information manipulation and interference in third countries. [Online]. Available: https://www.eeas.europa.eu/eeas/trade-and-technology-council-fourth-ministerial-%E2%80%93-annex-foreign-information-manipulation-and_en. [Accessed: Mar. 22, 2024].
- [54] S. Terp, P. Breuer. (2022). “DISARM: A framework for analysis of disinformation campaigns.” 2022 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Salerno, Italy, pp. 1–8, doi: 10.1109/CogSIMA54611.2022.9830669.
- [55] H. Newman. (2022). Foreign information manipulation and interference defense standards: Test for rapid adoption of the common language and framework “DISARM.” [Online]. Available: https://stratcomcoe.org/publications/foreigninformation-manipulation-and-interference-defence-standards-test-for-rapidadoption-of-the-common-language-and-framework-disarm-prepared-incooperation-with-hybrid-coe/253. [Accessed: Mar. 30, 2022].
- [56] R. Arcos. (2018). Post event analysis of the hybrid threat security environment: assessment of influence communication operations. [Online]. Available: https://www.hybridcoe.fi/publications/hybrid-coe-strategic-analysis-12-posteventanalysis-of-the-hybrid-threat-security-environment-assessment-of-influencecommunication-operations. [Accessed: Nov. 12, 2023].
- [57] M. Lesser, H.J. Stern, S.J. Terp. (2022). “Countering Russian misinformation, disinformation, malinformation and influence campaigns in Italy surrounding the Russian invasion of Ukraine,” International Forum on Digital and Democracy 2022. [Online]. Available: https://ceur-ws.org/Vol-3289/paper2.pdf. [Accessed: Nov. 12, 2023].
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-cf7650aa-92ac-4488-a924-2fde2bd4234e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.