Cyber Influence Defense: Applying the DISARM Framework to a Cognitive Hacking Case from the Romanian Digital Space

dc.contributor.authorBârgăoanu, Alina
dc.contributor.authorPană, Mihaela
dc.date.accessioned2024-10-22T11:19:41Z
dc.date.available2024-10-22T11:19:41Z
dc.date.issued2024
dc.descriptionThis is an open access article under the CC-BY 3.0 license, available at: https://www.acigjournal.com/pdf-190196-112700?filename=Cyber%20Influence%20Defense_.pdf The article is published in Applied Cybersecurity & Internet Governance -ACIG.
dc.description.abstractOne of the main lessons learned in the context of Russia’s full-scale invasion of Ukraine starting in February 2022 is that for- eign information manipulation and interference (FIMI) operations are closely coupled with cyber threats. Regardless of whether cyberattacks are followed by an information manipulation compo- nent and vice versa, the merger of the two can be an early indica- tor of the potential for a conflict to escalate from the cyber area to the ground. Our article is premised on the idea that today’s highly technologised information ecosystem is a fertile ground for cyberattacks and information manipulation in the context of FIMI; more specifically, it enables cognitive hacking, meaning hacking the human mind and human cognition altogether through techno- logical disruption and cyber pressure. Starting from this premise, the aim of the article is to highlight the technological determi- nants of cognitive hacking and identify silent or emerging threats that bypass technological sensors and seek to disrupt and manip- ulate the information environment. The empirical part is based on observation as a descriptive method, which is used to analyse a case of cognitive hacking carried out via a YouTube malvertis- ing campaign targeting Romanian users. This case study is anal- ysed qualitatively by matching the DISinformation Analysis & Risk Management (DISARM) framework with evidence collected through Open-Source Intelligence (OSINT) tools, following an innovative analysis structured according to the purposes, actions, results and techniques (PART) model. The extensive analysis of the identified case shows that applying the DISARM framework to cyber-enabled operations can be useful for anticipating and responding to FIMI threats, even when such operations do not appear to have a spe- cific, immediately identifiable purpose.
dc.identifier.citationBârgăoanu,A. & Pană, M. (2024). Cyber influence defence: Applying the DISARM framework to a cognitive hacking case from the Romanian digital space. ACIG, . 3, (1), (91-121). https://doi.org/10.60097/ACIG/190196
dc.identifier.otherhttps://doi.org/10.60097/ACIG/190196
dc.identifier.urihttps://www.acigjournal.com/
dc.identifier.urihttps://debdfdsi.snspa.ro/handle/123456789/397
dc.language.isoen
dc.publisherNASK – National Research Institute
dc.subjectCognitive hacking
dc.subjectCyberattacks
dc.subjectDeepfake
dc.subjectMalvertising
dc.titleCyber Influence Defense: Applying the DISARM Framework to a Cognitive Hacking Case from the Romanian Digital Space
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Content_Cyber.pdf
Size:
722 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: