UTHOUGHT: Cognitive Warfare Training for ROTC

UTHOUGHT: Cognitive Warfare Training for ROTC

Abstract

The Mind is the Next Frontier to Protect and Defend & it is Already under Attack from our Adversaries?(1)

At UTHOUGHT we seek to not only educate our cadets on the tools and techniques of Cognitive Warfare / Social Engineering but place them in the field as “operational researchers.” ROTC programming will not have capacity for formal cybersecurity training for the foreseeable future and as such this will be an extracurricular activity that is both highly encouraged by command and compensated through the ONR grant. We intend to provide real world objectives, most likely in an unofficial support capacity of US CYBERCOM, to affect cognitive transformation of our adversaries’ cyberspace.

Introduction to Cognitive Warfare

The future of cybersecurity is not defending against “bits and bytes” network attacks but rather the manipulation of human perception. Enter the realm of NATO’s 3rd Operating Dimension and 6th Warfighting Domain (2): Cognition. Cognitive Warfare, a relative of “Social Engineering”, we define as “next-order Cyberwarfare: Classical Game Theory is ultimately about making decisions – given rules and utility curves (and their associated payoff functions) who does what? Social Engineering on the other hand could be described as an applied branch of Game Theory where the rules and utility curves are altered – either in reality or just in meta – to adjust opponents play in reality. Bottom line CQW (Cognitive Warfare) is about bending information to the will of the beholder in order to manipulate the perceptions of our adversaries.” (1)

It should be noted this cannot be done in a silo – that is employing this tactic will have blowback on the aggressor’s population which must be accounted for.?(1) To account for blow back all tactics reduce to leveraging transparency as a weapon. We are quickly entering an age of “no more secrets” and as such OPSEC that relies on obfuscation of strategy is inherently flawed. Ostensibly this turns Sun Tzu on its head, deception being the heart of warfare and all, however “The knights of old would first put themselves beyond the possibility of defeat before mounting a devastating attack against their enemy; thus achieving victory” – to be beyond defeat against enemy that sees and knows all is to have a plan that can’t be defeated.

This is of course easier said than done and much research and development, in both human and computational resources, must be done before we start advertising our battle plans – however in order to do this we need to develop a new generation of CQW Operators and to do that we need a mission set. There is a clear need for “Operational Education” where training and operations are intermingled on a continuum – each driving the other.?(3)

The UTHOUGHT Concept

To enhance American and Allied standing in the international community we must defend and attack in the Cognitive Domain requiring a new breed of military operators trained in the tools of both cyber and psychology. We will educate our cadets in the art and science of information manipulation – and further place them in an operational role, almost from day one, to practice and hone their skills. The instruction of Cognitive Warfare cannot take place in a vacuum: as these skills are taught cadets will innately practice these skills in their everyday lives and thus we must provide them with missions to channel this energy for the benefit of their country.

Cognitive Education Workflow

Our process of placing cadets, under the tutelage of a Principal Investigator (Georgetown Professor) and a Graduate Leader (Research Assistant), in operational positions is described in the Business Process Model Notation (BPMN) diagram below.

No alt text provided for this image

Works Cited

1. MultiPlex.studio. A Cognitive Cyberwar. [Online] Sept 2020. [Cited: Feb 17, 2021.] https://multiplex.studio/files/CognitiveCyberwar.pdf.

2. NATO Innovation Hub. Cognitive Warfare. [Online] 2021. [Cited: Feb 17, 2021.] https://www.innovationhub-act.org/content/cognitive-warfare.

3. MultiPlex.studio. Open Source Asymmetric Cyberwarfare Curriculum. [Online] Sept 17, 2020. [Cited: Feb 17, 2021.] https://multiplex.studio/files/OpenSourceCyberwarfareEdu.pdf.


要查看或添加评论,请登录

Jason L. Lind的更多文章

  • Manifest Destiny of Cognition - A Libertarian Perspective

    Manifest Destiny of Cognition - A Libertarian Perspective

    The supreme art of war is to subdue the enemy without fighting -- Sun Tzu Men willingly believe what they wish --…

  • Coming to Terms with Suffering from Aspects of Mental Illness

    Coming to Terms with Suffering from Aspects of Mental Illness

    In 2007 I was diagnosed with Atypical Bi-Polar Type-1 with Severe Manic Episodes under the DSM IV. Great periods of…

    2 条评论
  • ReactiveUI+Telerik & MVVM with Blazor and MAUI

    ReactiveUI+Telerik & MVVM with Blazor and MAUI

    ReactiveUI is an advanced framework for building reactive, dynamic user interfaces in .NET applications.

  • The Ultimate Top 25 Movies of All Time

    The Ultimate Top 25 Movies of All Time

    #1: Doctor Strangelove (1964) #2: The Manchurian Candidate (1962) #3: Memento (2000) #4: Casablanca (1942) #5: M (1931)…

  • An Introduction to Transformation Engineering

    An Introduction to Transformation Engineering

    I define a Transformation Engineer as "a change agent for an organization who drives innovation of the…

  • Zero Trust Architecture (ZTA) Overview

    Zero Trust Architecture (ZTA) Overview

    Trust not: verify always! – Zero Trust was first coined in late 2009 by John Kindervag, a principal analyst at…

  • A Cognitive (UN)Civil War

    A Cognitive (UN)Civil War

    What is Cognitive Warfare? Cognitive Warfare, for our purposes, is simply next-order Cyberwarfare, or “beyond the bits…

  • Subject Matter Turing Test: Bughouse (4 player chess)

    Subject Matter Turing Test: Bughouse (4 player chess)

    The Game The game is Bughouse, a four player chess derivative. Two players comprise a team and each play a chess board…

    1 条评论
  • Ideal Organizational Theory Redux

    Ideal Organizational Theory Redux

    Ideal organization theory formulates a methodology for not only what it takes to create artificial intelligence but…

  • Secure Cognitive Architecture

    Secure Cognitive Architecture

    Historically base security has had a focus of maintaining a tight perimeter with additional perimeters configured at…

社区洞察

其他会员也浏览了