Use Case 1:
The identification phase
Information manipulation with unknown origin towards a critical foreign politician, leveraging national elections of Germany.
Use Case 2:
The investigation phase
Identifying non-state actors of a detected FIMI case against protests.
Use Case 3:
Counteraction phase
Countering the manipulated information dispersed on the web by Chinese accounts based on Russian state media sources to discredit and suppress critical voices.
Use Case 1: The identification phase
Use Case 1 aims to enhance the detection of information suppression attacks, testing the readiness and efficiency of project methodologies in the detection of TTPs. Target groups (e.g., journalists and cyber investigators) will cooperate, aiming to employ the Detection Tool-Method of RESONANT Suite to proceed a thorough open-source web searching to find out any suspicious events, posts, ads and interpersonal action.
Use Case 2: The investigation phase
Use Case 2 aims to enhance the cyber-investigation of an identified information suppression case, regarding the TTPs and actor’s origin, thus testing the readiness and efficiency of projects methodologies in the investigation of FIMI TTPs. Cyber investigators will use the Investigation Tool-Method of RESONANT Suite for open-source web searching to detect the digital front-back or target-actor pathway. They will then analyse the collected data to generate evidence on the country-actor identity.
Use Case 3: Counteraction phase
Use Case 3 aims at operating in an identified information suppression case, with stakeholders (i.e., journalists, cyber-investigators) in countering the actors’ TTPs by employing technology measures to stop the FIMI dispersion, thus testing the readiness and efficiency of methodologies in the interventions of FIMI TTPs. Cyber experts will employ the Intervention Tool-Method of RESONANT Suite to counter-narrate and block the suppression.