Cognitive Warfare Analysis

The Battlefieldis inside your mind

Analyzing information warfare, cognitive manipulation, and psychological operations. Understand the weapons. Build your defenses.

Scroll
DISINFO CAMPAIGN — Active threat detected DEEPFAKE ALERT — New AI bypass reported NATO COG WAR — Doctrine update published OSINT — New verification toolkit released INFLUENCE OP — Bot network identified DISINFO CAMPAIGN — Active threat detected DEEPFAKE ALERT — New AI bypass reported NATO COG WAR — Doctrine update published OSINT — New verification toolkit released INFLUENCE OP — Bot network identified
Latest Intel

Field Reports

All Reports
Assessing reliability in sources for influence operations analysis
Documented Operations

Sources for documenting influence operations

In March 2024, the European Centre of Excellence for Countering Hybrid Threats published findings on a coordinated disinformation campaign targeting European energy infrastructure narratives. What...

⏱ 9 min read
Anatomy of a viral hoax: dissecting modern disinformation propagation patterns
Case Studies and Analysis

Anatomy of a viral hoax: step-by-step dissection

In December 2023, a fabricated video purporting to show Ukrainian officials burning U.S. aid packages spread across Telegram channels before migrating to mainstream social platforms,...

⏱ 9 min read
Digital sovereignty and the transformation of state information architecture
Information Geopolitics

Digital sovereignty: who controls data and networks

When Estonia’s government went fully digital in 2014, officials described the initiative as advancing digital sovereignty—the capacity to maintain autonomous control over national digital infrastructure...

⏱ 8 min read
The evolution of synthetic media in cognitive warfare operations
Deepfakes and Audiovisual Manipulation

How deepfakes are created: the technology behind them

In February 2023, a sophisticated deepfake video depicting Ukrainian President Volodymyr Zelensky surrendering to Russian forces circulated across social media platforms for several hours before...

⏱ 8 min read
Why believe in conspiracies: cognitive vulnerabilities in information warfare
Conspiracy Theories

Why the human brain believes in conspiracies

In 2016, Russian operatives from the Internet Research Agency systematically exploited conspiracy beliefs to amplify divisive narratives across American social media platforms. Their success wasn’t...

⏱ 8 min read
Mapping coercive control in digital influence operations
Cults and Coercive Control

What is coercive control

In February 2024, Meta’s threat intelligence team documented a sophisticated operation targeting Ukrainian civil society organizations through a pattern of escalating digital harassment. What distinguished...

⏱ 8 min read
How the psychology of human error undermines cognitive resilience in influence operations
Human Factor in Cybersecurity

Psychology of human error in information security

In January 2024, Polish military analysts reviewing Operation Ghostwriter disinformation campaigns discovered a recurring pattern: successful penetration correlated not with sophisticated technical capabilities, but with...

⏱ 8 min read
The attention economy as a vector for cognitive warfare operations
Social Media Manipulation

The attention economy: why platforms hook us

In March 2024, Meta’s quarterly transparency report documented the removal of over 2,100 accounts linked to what the company classified as «coordinated inauthentic behavior» targeting...

⏱ 9 min read