{"id":50824,"date":"2019-09-26T12:27:08","date_gmt":"2019-09-26T02:27:08","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=50824"},"modified":"2019-09-26T12:27:08","modified_gmt":"2019-09-26T02:27:08","slug":"information-warfare-and-neuro-weaponry","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/","title":{"rendered":"Information warfare and neuro-weaponry"},"content":{"rendered":"
<\/figure>\n

The parameters of contemporary conflict, as ASPI\u2019s Tom Uren noted recently<\/a>, are shifting. Transformations in the character of warfare have always attracted varying levels of attention and opposition, and plenty of hubris. In general, the national security, intelligence and defence community has muddled through. Some of that\u2019s been due to the best combination of analytical rigour, intuitive talent and a wisdom that only experience and time can bring. But, as Andrew Davies has pointed out<\/a>, some of it\u2019s due to blind, random luck.<\/p>\n

One aspect of the current shift that Australia\u2019s security community should be paying attention to is developments in the application of cognitive neuroscience to national security. The landmark US study on this topic was the National Research Council\u2019s Emerging cognitive neuroscience and related technologies<\/a><\/em>, published in 2008. A comprehensive overview was provided in the book Mind wars<\/em><\/a> by Jonathan D. Moreno, first published in 2006 and updated in 2010, which was followed by a number of other excellent studies by other authors. And since 2007, the annual conference<\/a> organised by the US Department of Defense\u2019s Strategic Multilayer Assessment program has brought the national security and cognitive neuroscience communities together for wide-ranging discussions.<\/p>\n

The insights of the cognitive neurosciences over the past two decades have been rich and enlightening. Many of them will be used in pursuit of furthering human wellbeing. But many, of course, will be employed in the everchanging means by which human beings make war. A \u2018neuro-weapon\u2019, as described broadly by James Giordano<\/a>, is anything that accesses the brain to contend with others. Defence dual-use neuro-technology has been the subject of numerous DARPA<\/a> and IARPA<\/a> research programs for years now.<\/p>\n

Using the tools of neuro-weaponry involves the three A\u2019s\u2014access, assess and affect. For a long time most have intuitively thought of accessing the human brain in terms of direct proximity\u2014sticking things inside or aiming things at the human skull and tinkering. This is a misconception. Insights into cognitive processes have suggested ways to achieve the three A\u2019s at a distance. One of the fundamental enablers here has been the advent of the digital age\u2014acting as connective tissue, substrate or medium through which effects are propagated.<\/p>\n

The constant connectivity provided by the internet and mobile devices, combined with the attention-based economic models that now dominate internet platforms, has since the mid-2000s accelerated societies to a state of hyper-connectivity unprecedented in human history. Contrary to early hopes, nothing about global connectivity is inherently emancipatory.<\/p>\n

What the digital substrate amounts to is access to the human brain at a distance. As more has been learned about the neurophysiology of cognitive states, much has been gleaned from the deluge of data produced by the now ubiquitous practice of \u2018lifelogging\u2019 underpinning much of the digital human\u2013computer interface that makes up our daily lives. DARPA\u2019s Biological Technology Office studied these processes under its \u2018Narrative networks\u2019 and \u2018Social media in strategic communications\u2019 projects, among numerous others.<\/p>\n

In the commercial space, the engineering of human\u2013computer interaction has been a growth industry for two decades<\/a>. Every interaction people have with computers, particularly computers connected to the internet, is taking place in a zone of cognitive manipulation. There are very few neutral or benign interactions\u2014opportunities for cognitive exploitation and control are built into the way we built the digital age. It is exploitable by design, and that\u2019s a huge problem<\/a>.<\/p>\n

Awareness of this shift is growing inside Australia\u2019s security agencies. Those at the front line of contemporary conflict in the defence organisation have a sharpening understanding of the imperative to act. What the shift to the cognitive domain reveals, however, is that the previous orientations towards vying for information in the electromagnetic spectrum and in the human domain, as episodic and separate lines of effort in support of lethal effects delivered on the conventional battlefield, will be insufficient.<\/p>\n

Contending in the cognitive domain, in which the whole of Australian society is situated, will require a coordinated effort and alignment of strategic intent across the whole of government, as retired major general and former senator Jim Molan<\/a> writes. Meanwhile, we face an adversarial environment in which unscrupulous, agile and imaginative actors are investing in the ways and means of cognitive warfare at an accelerating rate.<\/p>\n

What mustn\u2019t be overlooked in this unfortunate turn of events is the foundation of the society Australia is aiming to defend. Open democracy is based, more than anything else, on conventions\u2014expectations about how people interact with one another and with the state. The fabric of these conventions is trust. The same goes for a middle power like Australia in its international interactions.<\/p>\n

Trust is a strategic resource, not an auxiliary luxury. The world of digitally manipulative cognitive warfare is profoundly complex. Effects vary\u2014side effects and accidents are impossible to control. Interventions in complex human systems involve deep uncertainty and should be approached with extreme caution. In the haste to react, the risk of undermining the very thing we are aiming to defend is real. Which would amount to doing the adversary\u2019s job for it. There are ways and means of acting defensively in the digital age. Many of them have little to do with technology. \u00a0\u00a0\u00a0<\/em><\/p>\n

Adversarial information operations aimed at sowing discord and disruption in open societies create a narrative signature that can be modelled and mapped as it transits the digital terrain. We currently have the technology to identify and track these signatures, but we are yet to put it to full use. Full control of the narrative in the digital terrain is, however, a fantasy. Open societies like Australia\u2019s can pursue denial of hostile narratives transiting cyberspace without harbouring hubristic expectations about \u2018winning\u2019 the cognitive contest.<\/p>\n

We already know what the fabric of open society is made of: human relationships. Understanding how these are being warped and transformed by digital technologies, with or without an adversarial narrative attached, is the key to democratic resilience. A little-acknowledged strategic capability of great importance for Australia as it navigates its digital future will be the transformation of our current societal approach to the development and deployment at scale of technologies with immense implications for the lives of individuals, families, communities and the nation.<\/p>\n","protected":false},"excerpt":{"rendered":"

The parameters of contemporary conflict, as ASPI\u2019s Tom Uren noted recently, are shifting. Transformations in the character of warfare have always attracted varying levels of attention and opposition, and plenty of hubris. In general, the …<\/p>\n","protected":false},"author":1020,"featured_media":50830,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[17,2590,1114,332],"class_list":["post-50824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australia","tag-cognitive-warfare","tag-defence","tag-technology"],"acf":[],"yoast_head":"\nInformation warfare and neuro-weaponry | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information warfare and neuro-weaponry | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The parameters of contemporary conflict, as ASPI\u2019s Tom Uren noted recently, are shifting. Transformations in the character of warfare have always attracted varying levels of attention and opposition, and plenty of hubris. In general, the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-26T02:27:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/7780990192_47968158be_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zac Rogers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zac Rogers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/7780990192_47968158be_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/7780990192_47968158be_z.jpg\",\"width\":640,\"height\":360},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/\",\"name\":\"Information warfare and neuro-weaponry | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#primaryimage\"},\"datePublished\":\"2019-09-26T02:27:08+00:00\",\"dateModified\":\"2019-09-26T02:27:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0bce3575c1fa769ec1d0e22e7e7a8bd7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information warfare and neuro-weaponry\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0bce3575c1fa769ec1d0e22e7e7a8bd7\",\"name\":\"Zac Rogers\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/97c401b837fe271f4d3238f786b5a2dd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/97c401b837fe271f4d3238f786b5a2dd?s=96&d=mm&r=g\",\"caption\":\"Zac Rogers\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zac-rogers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information warfare and neuro-weaponry | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/","og_locale":"en_US","og_type":"article","og_title":"Information warfare and neuro-weaponry | The Strategist","og_description":"The parameters of contemporary conflict, as ASPI\u2019s Tom Uren noted recently, are shifting. Transformations in the character of warfare have always attracted varying levels of attention and opposition, and plenty of hubris. In general, the ...","og_url":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2019-09-26T02:27:08+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/7780990192_47968158be_z.jpg","type":"image\/jpeg"}],"author":"Zac Rogers","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zac Rogers","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/7780990192_47968158be_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/7780990192_47968158be_z.jpg","width":640,"height":360},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/","url":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/","name":"Information warfare and neuro-weaponry | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#primaryimage"},"datePublished":"2019-09-26T02:27:08+00:00","dateModified":"2019-09-26T02:27:08+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0bce3575c1fa769ec1d0e22e7e7a8bd7"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/information-warfare-and-neuro-weaponry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Information warfare and neuro-weaponry"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0bce3575c1fa769ec1d0e22e7e7a8bd7","name":"Zac Rogers","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/97c401b837fe271f4d3238f786b5a2dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/97c401b837fe271f4d3238f786b5a2dd?s=96&d=mm&r=g","caption":"Zac Rogers"},"url":"https:\/\/www.aspistrategist.ru\/author\/zac-rogers\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50824"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1020"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=50824"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50824\/revisions"}],"predecessor-version":[{"id":50827,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50824\/revisions\/50827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/50830"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=50824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=50824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=50824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}