The team of COMPUTER2000 is excited to present you with one of the most recent and most important reports produced in the Cybersecurity industry. The report the team of COMPUTER2000 would like to present to your attention puts forward and tests an analytical approach to describe the creation and dissemination behaviours of Foreign Information Manipulation and Interference (FIMI) and disinformation as a way to draw the attention to the activities the EU aims to prevent, deter and respond to.
With broader hybrid threats crossing different domains, the European External Action Service (EEAS) and the European Union Agency for Cybersecurity (ENISA) publish today a joint report on the relation between cybersecurity and FIMI to better understand and adapt to the evolving threat landscape. The ambition is to provide an input to the on-going and ever-pressing discussion on the nature and dynamics of information manipulation and interference, including disinformation, and on how to collectively respond to this phenomenon.
You can download the official report from this authorised link
Intentional attempts to manipulate the information environment and public discourse by foreign actors is by no means a new phenomenon. Described in the past as “propaganda” or more recently as “disinformation”, activities labelled as such have received a considerable new impetus by technological advancements and the propagation of the internet, in particular social media and private messenger services. These developments have also provided significant possibilities to increase the reach of such activity as well as the combination of new and diverse tactics, techniques and procedures that are used across domains.
“Hack and leak” episodes, establishing legitimacy of specific content by compromising authoritative accounts or sharing alleged authentic material are only some of the examples that illustrate the dependent relationship between cybersecurity and the manipulation of the information environment.
Considering how hybrid threats crossing different domains are expanding, the analytical approach proposed by the report describes FIMI, as well as the underlying cybersecurity elements, by combing practices from both.
Tested on a limited set of events the report draws some preliminary conclusions on the relationship between cybersecurity and FIMI/disinformation, such as:
- the role of cybersecurity in establishing attribution of FIMI/disinformation operations;
- the importance of a structured, interoperable and seamless incident reporting process between the cybersecurity and FIMI/disinformation communities;
- the importance of information sharing and the sharing of best practices between the cybersecurity and counter-FIMI/disinformation communities;
- enhancing and facilitating the cooperation among EU institutions and bodies at policy level;
- raising awareness and support the capacity building of Member States and of international partners.
The report has benefited from the support of the ENISA ad hoc Working Group on Cybersecurity Threat Landscapes.
You can download the official report from this authorised link
The report was published to coincide with the fourth edition of the CTI-EU event that brings stakeholders together to promote the dialogue and envision the future of Cyber Threat Intelligence for Europe.
Further information
Foreign Information Manipulation Interference (FIMI) and Cybersecurity – Threat Landscape 2022
ENISA Threat Landscape 2022 – Infographic
ENISA Threat Landscape Report 2022
European Democracy Action Plan – European Commission
A Strategic Compass for Security and Defence – EEAS
Foreign Information Manipulation and Interference – European Council
___
If this information is helpful to you read our blog for more interesting and useful content, tips, and guidelines on similar topics. Contact the team of COMPUTER 2000 Bulgaria now if you have a specific question. Our specialists will be assisting you with your query.
Content curated by the team of COMPUTER 2000 based on official publications by the European Union Agency for Cybersecurity, including the Threat Landscape report for 2022. The full text of the report can be found here.
Follow us to learn more
CONTACT US
Let’s walk through the journey of digital transformation together.