0 0
Read Time:1 Minute, 5 Second

Targeting youth for future gains – Playing Go with Cognitive Warfare

China’s view of Cognitive Warfare as an evolution of information. Specifically, China believes that intelligence-based warfare is an evolution of information warfare. Intelligence-based warfare is highly evolved information warfare — system-of-systems confrontation reliant on information moving through digital systems and networks. China now combines overt aggressive tactics with covert methods. Along with soft power, Chinese intelligence services rooted in global organizations deliberately target growing economies and strategic locations in critical infrastructures. As one of the largest growing economies, China sees fit to make moves to influence global dynamics. China uses journalists, online media outlets, the movie industry, social media, and gaming platforms to influence and educate. The slow method of brainwashing targets aligns directly with their long-term strategy. Their practices resemble placing a frog in a pot of cool water on your stove and slowly heating the water. The frog is unable and unwilling to discern the changes in temperature to the point of certain death.

Read the full brief 

The Chinese surveillance state integrates social credit scoring methods into games, social media platforms, and social media challenges’ focusing on the young. By the time, the early teens of today become adults, the idea of breaking trust is part of their ethos.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence