Home of Veshom Cavalry Regiment

Tuesday, 2 July 2024

Cognitive Warfare ( Cogwar )

What it is 

“Cognitive Warfare is a strategy that focuses on altering how a target population thinks and through that how it acts” (Backes & Swab, 2019); “the weaponization of public opinion, by an external entity, for the purpose of (1) influencing public and governmental policy and (2) destabilizing public institutions” (Bernal et al., 2020, p. 10).

 Source: https://link.springer.com/article/10.1007/s10676-023-09717-7


  • manipulate people’s mental processes, including perception, beliefs, emotions, and decision-making, by employing digital technologies and exploiting human cognitive flaws. 
  • Its goal is to change not just what people think but also how they think. 
  • CogWar weaponizes narratives to influence policies and destabilize societies by sowing
    •  confusion
    • amplifying social divisions
    • undermining the trust and credibility of democratic states. 
  • CogWar is an umbrella term that encompasses various operations, such as 
    • information warfare, 
    • cyber warfare, 
    • psychological warfare, 
    • political warfare, and even 
    • lawfare
while incorporating aspects of cognitive neuroscience.

https://www.moore.army.mil/infantry/DoctrineSupplement/ATP3-21.8/PDFs/adrp3_0.pdf

Who conducts Cogwar and Where

  • Everyone does it:
    • Countries'
    • Political Parties: Autocrats, Democrats & Republicans
    • Protest Movements
    • Non Profits
    • States, Cities
    • Educational institutions
    • Religious institutions
  • Russia is the most skilled  Practitioners of  Cogwar , but China is spending significant resources to catch up.
  • The evolving information space has facilitated the emerging CogWar. This unconventional form of conflict aims to 
Purpose Driven or 
  •  Purpose driven cogwar is essential for autocrats and dictators to stay in power, and require both internal and external strategies. 
  • Purpose driven cogwar in liberal democracies has both internal and external strategies as well. Internally, there is a competition of persuasion that occurs in elections. 
    • The temporary winner of this competition gets the right to lead their people for a season. This same group gets to design the external strategy, which is carried out by both diplomatic and their national security agencies
    • The ethics of  Internal cogwar have not been well explored, but
Haphazard Cogwar

  • Haphazard cogwar happens in any entity that focuses only on kinetic warfare and let the chips fall where they may on other dismissions of hybrid warfare
  • Since the
[1]
Alazab, M. (2022). Russia is using an onslaught of cyber attacks to undermine Ukraine’s defence capabilities. The Conversation. Retrieved February 24, 2022, from https://theconversation.com/russia-is-using-an-onslaught-of-cyber-attacks-to-undermine-ukraines-defence-capabilities-177638
[2]
Backes A and Swab A Cognitive warfare: The Russian threat to election integrity in the Baltic states 2019 Belfer Center for Science and International Affairs, Harvard Kennedy School
[3]
Bernal, A., Carter, C., Singh, I., Cao, K., & Madreperla, O. (2020). Cognitive warfare. NATO Report, 10.
[4]
Cao, K., Cao, K, Glaister, S., Pena, A., Rhee, D., Rong, W., Rovalino, A. (2021). Countering cognitive warfare. NATO Reviewhttps://www.nato.int/docu/review/articles/2021/05/20/countering-cognitive-warfare-awareness-and-resilience/index.html
[5]
Cocking D and van den Hoven J Evil on-line 2018 Wiley Blackwell
[6]
D’Alessio FA Computational propaganda: Challenges and responses Academia Letters 2021
[7]
DeFranco J, DiEuliis D, and Giordano J Redefining neuroweapons Prism 2020 8 3 49-63
[8]
Dipert RR Ethics of cyberwarfare Journal of Military Ethics 2010 9 384-410
[9]
Galliott J Force short of war in modern conflict: Jus ad Vim 2019 Edinburgh University Press
[10]
Greenwald, G. (2014). How covert agents infiltrate the internet to manipulate, deceive and destroy reputations. The Intercept. Retrieved February 24, 2014, from https://theintercept.com/2014/02/24/jtrig-manipulation/
[11]
Gross M and Meisels T Soft war: The ethics of unarmed conflict 2017 Cambridge University Press
[12]
Hung TC and Hung TW How China’s cognitive warfare works Journal of Global Security Studies 2020 7 4
[13]
Johnson L Miller S, Regan M, and Walsh PF The “third option” in American foreign policy National security intelligence and ethics 2021 Routledge
[14]
Lucas G Ethics and cyber war 2017 Oxford University Press
[15]
Lucas G Allhoff F Just in silico: moral restrictions on the use of cyberwarfare Routledge handbook of ethics and war: Just war in the 21st century 2013 Routledge
[16]
MacDonald, A., & Ratcliffe, I. (2023). Cognitive warfare: Manoeuvring in the human dimension. US Naval Institute. https://www.usni.org/magazines/proceedings/2023/april/cognitive-warfare-maneuvering-human-dimension
[17]
May L Gross M and Meisels T The nature of war and the idea of “cyber war” Soft war: The ethics of unarmed conflict 2017 Cambridge University Press
[18]
Miller S Social action South African Journal of Philosophy 1994 13 1 9-17
[19]
Miller S Social action: A teleological account 2001 Cambridge University Press
[20]
Miller, S., (2006). Collective moral responsibility: An individualist account. In P. A. French (Ed.), Midwest studies in philosophy (Vol. XXX, pp. 176–193).
[21]
Miller S The moral foundations of social institutions 2010 Cambridge University Press
[22]
Miller S Allfhoff F, Henschke A, and Strawser BJ Cyber-attacks and ‘dirty hands’: Cyberwar, cyber-crimes or covert political action? Binary bullets: The ethics of cyberwarfare 2016 Oxford University Press 228-250
[23]
Miller S Shooting to kill: The ethics of police and military use of lethal force 2016 Oxford University Press
[24]
Miller S Corruption and anti-corruption in policing: Philosophical and ethical issues 2016 Springer
[25]
Miller S Galliott J Jus ad Vim: The morality of military and police use of force in armed conflicts short of war Force short of war in modern conflict: Jus ad Vim 2019 Edinburgh University Press
[26]
Miller S Christen M, Gordjin B, and Loi M Freedom of political communication, propaganda and the role of epistemic institutions in cyberspace The ethics of cybersecurity 2020 Springer
[27]
Miller, S. (2023). War, reciprocity and the moral equality of combatants. Philosophiahttps://link.springer.com/article/10.1007/s11406-023-00678-1
[28]
Miller S and Bossomaier T Cybersecurity, ethics and collective responsibility 2023 Oxford University Press
[29]
Miller S, Regan M, and Walsh PF National security intelligence and ethics 2021 Routledge
[30]
Office of the Director of National Intelligence. (2018). A guide to cyber attribution. https://www.dni.gov/files/CTIIC/documents/ODNI_A_Guide_to_Cyber_Attribution.pdf
[31]
Perry DL Partly cloudy: Ethics in war, espionage, covert action and interrogation 2009 Scarecrow Press
[32]
Regan M and Poole M Miller S, Regan M, and Walsh PF Accountability of covert action in the United States and the United Kingdom National security intelligence and ethics 2021 Routledge
[33]
Rowe NC et al. Allhoff F et al. Perfidy in cyberwarfare Routledge handbook of ethics and war: Just war in the 21st century 2013 Routledge
[34]
Schmitt MM Tallinn manual on the international law applicable to cyberwar 2013 Cambridge University Press
[35]
Sloss D Tyrants on twitter 2022 Stanford University Press
[36]
Smith NV Mutual knowledge 1982 Academic Press