Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments
Influencing masses is one way of achieving military and political goals. As seen in the U.S. 2016 election campaign, adversaries are prepared to go great length to test new ways of battle. When event such as terrorist attack or natural disaster strikes, people are prone to believe anything they see...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Croatian Defence Academy
2020-01-01
|
Series: | Strategos |
Subjects: | |
Online Access: | https://hrcak.srce.hr/file/362599 |
_version_ | 1797945214173708288 |
---|---|
author | Dalibor Gernhardt |
author_facet | Dalibor Gernhardt |
author_sort | Dalibor Gernhardt |
collection | DOAJ |
description | Influencing masses is one way of achieving military and political goals. As seen in the U.S. 2016 election campaign, adversaries are prepared to go great length to test new ways of battle. When event such as terrorist attack or natural disaster strikes, people are prone to believe anything they see without questioning the source or truthfulness of information. This work focuses on researching steps necessary to be performed by adversaries aiming to perform influence operation by method of placing malicious comments on websites. Potential adversary must evaluate target, identify most relevant websites and analyse commenting systems to make decision how to exploit them. Once adversaries choose course of action, their next step is creation of trustworthy, in this case Facebook profiles, which later can be used for malicious operations. For purpose of testing this methodology, vulnerability assessment of the Croatian webspace is performed, and Facebook as a dominant platform for writing comments is identified. In conclusion a formula for estimation of workforce required for creation and maintenance of false Facebook profiles is given. Knowledge about adversaries’ action is essential for effective defence in hybrid warfare environment. |
first_indexed | 2024-04-10T20:51:37Z |
format | Article |
id | doaj.art-b75810712f684b29b691859f0db8f86d |
institution | Directory Open Access Journal |
issn | 2459-8771 2459-8917 |
language | English |
last_indexed | 2024-04-10T20:51:37Z |
publishDate | 2020-01-01 |
publisher | Croatian Defence Academy |
record_format | Article |
series | Strategos |
spelling | doaj.art-b75810712f684b29b691859f0db8f86d2023-01-23T12:08:02ZengCroatian Defence AcademyStrategos2459-87712459-89172020-01-01423965379Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites commentsDalibor GernhardtInfluencing masses is one way of achieving military and political goals. As seen in the U.S. 2016 election campaign, adversaries are prepared to go great length to test new ways of battle. When event such as terrorist attack or natural disaster strikes, people are prone to believe anything they see without questioning the source or truthfulness of information. This work focuses on researching steps necessary to be performed by adversaries aiming to perform influence operation by method of placing malicious comments on websites. Potential adversary must evaluate target, identify most relevant websites and analyse commenting systems to make decision how to exploit them. Once adversaries choose course of action, their next step is creation of trustworthy, in this case Facebook profiles, which later can be used for malicious operations. For purpose of testing this methodology, vulnerability assessment of the Croatian webspace is performed, and Facebook as a dominant platform for writing comments is identified. In conclusion a formula for estimation of workforce required for creation and maintenance of false Facebook profiles is given. Knowledge about adversaries’ action is essential for effective defence in hybrid warfare environment.https://hrcak.srce.hr/file/362599hybrid warfare, cyberspace, websites comments, social networks, influence operation |
spellingShingle | Dalibor Gernhardt Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments Strategos hybrid warfare, cyberspace, websites comments, social networks, influence operation |
title | Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments |
title_full | Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments |
title_fullStr | Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments |
title_full_unstemmed | Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments |
title_short | Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments |
title_sort | vulnerability assessment of the croatian cyberspace to information warfare campaign via means of malicious websites comments |
topic | hybrid warfare, cyberspace, websites comments, social networks, influence operation |
url | https://hrcak.srce.hr/file/362599 |
work_keys_str_mv | AT daliborgernhardt vulnerabilityassessmentofthecroatiancyberspacetoinformationwarfarecampaignviameansofmaliciouswebsitescomments |