Cognitive Warfare

Cyber war – large-scale destruction without the use of military force

Cyber war has the potential of large-scale destruction without the use of military force and can be used without an official declaration of war. As a strong current, the "soft" paradox is a good guide to dealing with hybrid threats and hybrid warfare and its responses and countermeasures, as well as resilience and vulnerability. https://cybershafarat.com/2023/02/18/cognitive-warfighter/ To achieve success, one cannot focus only on difficult defense or security issues and only look for war. This can…

Read More

RU Analysis: Kamala Harris – Seven Radicals

Kamala Devi Harris Psychological picture as RU Intelligence analysis defined. US Vice President. Born October 20, 1964 in Oakland, California. Father Donald Harris is a Jamaican economist who immigrated to the United States. Mother Shyamala Gopalan is an Indian cancer researcher. Conclusions Kamala Harris is a strong, strong-willed, charismatic, and purposeful person. Seeks to dominate negotiations. In negotiations, she is determined only to win and will defend her point of view despite all the opponent's…

Read More

Limitations of the Cognitive Domain?

https://cybershafarat.com/2023/04/11/65021/ The cognitive domain should not be limited to influencing information operations, social engineering and the conceptual approach of "controlling hearts and minds," but should include all domains in which there is a possibility of ideological attacks. https://cybershafarat.com/2023/04/22/miami-cyber-cognitive-warfighter-training/ The corruption of the mind is not just the public but cyber functions since these groups are now on the front lines. One problem is the lack of realization by organizations that this is a fact. We…

Read More

Miami – Cyber Cognitive Warfighter Training

Cyber Cognitive Warfighter Training This course includes the use of ChatGPT and other AI solutionsMay 15-19 Monday through Thursday 7:45-5 PM, Friday 7:45-12 PM.Weston, Florida (Miami-Fort Lauderdale) Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage. Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during…

Read More

The Chef Doesn’t Like His Own Food

Chef Prigozhin, accustomed to making and dishing out his own plates of disinformation, finds it distasteful to eat multiple meals of the same: “We look forward to”: Prigozhin commented on the plans of the CIA to criticize him in the media With the help of the CIA, the Russian oligarchs want to throw in the press material discrediting businessman and founder of Wagner PMC Yevgeny Prigozhin. This was reported by the entrepreneur himself. According to him,…

Read More

Cyber Cognitive Warfighter Training with Open AI / ChatGPT functions

Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - New York City Jun 12-16 OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting…

Read More

How Russia Sees It – Information Diversions Ukraine

INFORMATION DIVERSIONS IN THE CONFLICT IN UKRAINE To identify and classify the forms and methods of information warfare in the modern conflict in Ukraine (in the context of the war in Ukraine). Procedures and methods. The study was carried out using the methods of analysis, synthesis, generalization and interpretation of the results. Results. The forms and methods of conducting information warfare in Ukraine under the conditions of the war (strategic information operations, special propaganda, fakes…

Read More

Trust is a vital asset

Trust is a vital asset for any society that can be damaged or even destroyed by the use of various cognitive weaponsFew countries are as committed to spreading false information among their society as Russia.Michiko Kakutani, cultural critic and author of The Death of Truth, tells how Russia uses propaganda to distract and destroy. Destroying its own people (and citizens of foreign countries) through a mass media of lies, tricking people into stopping, not resisting,…

Read More