Materials LTT2

LTT

Navigating Digital Risks: Disinformation & Counter-Strategies

The “From Data Protection to Intelligence: Navigating Digital Risks” session examines how disinformation, propaganda, and information manipulation operate in the digital era. It highlights both the tactics of deception and the strategies for resilience.

Topics covered:

  • Distinguishing misinformation, disinformation, malinformation, and propaganda
  • Deceptive techniques: misleading content, fabricated stories, manipulated visuals, deepfakes
  • Case studies: Russian election influence (2016), Pizzagate, COVID-19 falsehoods, Cambridge Analytica
  • Impacts: polarization, declining trust, confirmation bias, emotional triggers
  • Amplification methods: bots, trolls, echo chambers, conspiracy networks, fake outlets
  • Solutions: verification tools, prebunking, education in digital/media literacy, technological detection, regulatory and civic action

The module empowers participants to detect and counter digital manipulation, building stronger critical thinking and democratic resilience in an information-saturated world.

Social Engineering & Digital Manipulation Risks

This session explores the human side of cybersecurity, focusing on how social engineering exploits trust, fear, and curiosity to bypass defenses.

Highlights include:

Understanding the differences between misinformation, disinformation, and malinformation

Case studies: Blue Whale Challenge hoax and the 2020 Twitter Bitcoin Scam

Common social engineering tactics: phishing, smishing, vishing, pretexting, baiting, tailgating, quid pro quo

The psychology behind manipulation and the red flags to watch for

Risk analysis: identifying vulnerabilities, assessing impacts, and applying mitigation strategies

Interactive group exercises: phishing challenges and role-plays

By the end of this session, participants gain practical awareness of how manipulation techniques target human behavior and how to defend against them in both personal and organizational contexts.

From Data Protection to OSINT: Intelligence in the Digital Age

Day 3 of the training focused on the foundations of information security and the basics of open-source intelligence (OSINT).

Key elements included:

  • Introduction to the CIA Triad (Confidentiality, Integrity, Availability)
  • Overview of GDPR & KVKK and their role in protecting personal data
  • Interactive exercises and games on core cybersecurity concepts
  • Data breach simulation to understand real-world impacts of ransomware
  • Introduction to intelligence theory and OSINT methods

By the end of this session, participants developed a stronger understanding of how data protection, legal frameworks, and OSINT tools come together to build digital resilience.

Fighting Disinformation with SOCMINT – Interactive Training

This video shows highlights from Day 4 of the training on Social Media Intelligence (SOCMINT), where participants learned how intelligence methods can be applied to social media platforms and practiced through interactive games.

Key elements:

  • SOCMINT concepts: platforms, data sources, and collection/verification methods
  • Legal & ethical considerations (GDPR & KVKK) in social media intelligence
  • Role-Play Game – The Viral Imposter: Participants acted out a fake account scenario to explore oversharing, impersonation, and disinformation, deciding how to respond as individuals, institutions, and law enforcement.
  • Digital Taboo Game: Teams explained cybersecurity and SOCMINT concepts (e.g., phishing, strong passwords, deepfakes, privacy settings) without using “forbidden” words, reinforcing awareness in a fun, competitive format.
  • SOCMINT countermeasures: account protection, fact-checking, monitoring disinformation campaigns.

The session connected theory from the SOCMINT presentation with practical group activities, helping participants build skills to detect manipulation, verify online content, and protect their digital identities.

Education Materials

The From Data Protection to Intelligence: Navigating Digital Risks training resource explores how disinformation, propaganda, and false narratives shape today’s digital environment and threaten democratic resilience.

Key topics include:

  • Defining disinformation, propaganda, misinformation, and malinformation
  • Common techniques: false context, manipulated content, deepfakes, imposter accounts
  • High-impact case studies: 2016 U.S. election interference, Pizzagate, COVID-19 infodemic, Cambridge Analytica scandal
  • Psychological effects: confirmation bias, polarization, erosion of trust, emotional manipulation
  • Channels of spread: bots, troll farms, echo chambers, conspiracy networks, fake news sites
  • Counter-strategies: fact-checking, prebunking, media literacy, technological tools, regulation, and community initiatives

This module equips participants with the knowledge to recognize, analyze, and counter digital risks by strengthening critical thinking, media literacy, and resilience against manipulation.

The Types of Social Engineering and Risks training explores how manipulation, deception, and human psychology are exploited in the digital world.

Key topics include:

  • Differences between misinformation, disinformation, and malinformation
  • Information disorder and manipulative use of data for political/social purposes
  • Case studies: Blue Whale Challenge hoax (2016–2017) and Twitter Bitcoin Scam (2020)
  • Common attack types: phishing, spear phishing, smishing, vishing, pretexting, baiting, tailgating, quid pro quo
  • The role of human psychology in security breaches
  • Risk analysis and mitigation strategies to reduce vulnerability

Through real-world examples, participants learn to recognize red flags in social engineering attacks and practice resilience against digital manipulation.

The Open Source Intelligence (OSINT) training introduces participants to the role of publicly available information in cybersecurity, intelligence, and decision-making.

Key topics include:

  • Fundamentals of information security and the CIA Triad
  • Intelligence theory and the Intelligence Cycle
  • Core OSINT concepts, subfields (SOCMINT, GEOINT, IMINT, CYBINT, FININT)
  • Tools and techniques: reverse image search, metadata analysis, WHOIS, Shodan, Censys, etc.
  • Legal and ethical boundaries (GDPR, KVKK compliance)
  • Case study: MH17 investigation using social media, satellite imagery, and metadata

This module equips participants with structured methods for planning, collecting, analyzing, and disseminating open-source data, enhancing resilience against digital threats and supporting informed decision-making.

The Social Media Intelligence (SOCMINT) training module introduces participants to the role of social platforms in intelligence, counterintelligence, and information security.

Key topics include:

  • Definition and scope of SOCMINT within OSINT
  • Applications: security & intelligence, crisis management, journalism, marketing
  • Data sources: posts, hashtags, profiles, geotags, engagement metrics, networks
  • SOCMINT cycle: objectives → collection → verification → analysis → dissemination
  • Tools: Gephi, NodeXL, Maltego, InVID/WeVerify, Google Reverse Image Search, TinEye, Hootsuite, Brandwatch, Talkwalker, Meltwater
  • Case studies: election disinformation, Ukraine conflict (Telegram monitoring), brand crisis monitoring
  • SOCMINT in hybrid warfare and counterintelligence integration

This resource equips participants to analyze social media data, detect disinformation, and apply countermeasures while respecting legal and ethical boundaries (GDPR, KVKK).

The Group Games and Final Activity session concludes the training with interactive reflections and a crisis-based simulation.

Key activities include:

  • Day Recap: Review of Days 1–4 (Disinformation, Social Engineering, OSINT, Counterintelligence & SOCMINT)
  • Participant Reflections: Sharing insights and experiences
  • Group Simulation: Teams investigate real-world disinformation scenarios using OSINT & SOCMINT tools
    • Case 1: COVID-19 Fake News (5G towers, miracle cures, viral videos)
    • Case 2: National Crisis Disinformation (country-specific examples)
    • Case 3: Amazon Wildfires (misleading images shared online)
  • Presentations & Trainer Feedback

This final session strengthens participants’ ability to detect fake news and disinformation, apply verification tools, and work collaboratively under time pressure.

Tags :

LTT

Share This :

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir

Copyright © 2024. All rights reserved