The essence of cognitive confrontation is knowledge confrontation and intellectual competition. Adversaries need to have full cognition, deep understanding and rapid response to the cyber environment, threats, targets, and opponents, and the analysis, judgment, decision-making, will and other cognitive level.
Ability, will directly affect cyber confrontations, the organization of the campaign, the decision of the strategy, and the trend and success or failure of the engagement. The concept of winning and losing in cognitive warfare has expanded from "hard damage to compete for battlefield space and focus on destroying the enemy's living forces" to "soft penetration affecting morale and people's hearts, and cognitive games interfering with the adversary's command and decision-making".
Cognitive confrontation in human warfare will be upgraded from intellectual competition and knowledge confrontation between people to AI. But first, we as humans need to learn all we can about cognitive warfare.
Hybrid warfare entails a fusion of conventional as well as unconventional instruments of power and tools of subversion. We blend tools in a synchronized manner to exploit the vulnerabilities of an adversary achieving harmonious effects. We also cover Third Wave Warfare from Alvin and Heidi Toffler.
Disinformation: Carefully contrived misinformation prepared to mislead, delude, disrupt, or undermine confidence in individuals, organizations, institutions, or governments. “False information about someone or something, disseminated as a hostile act of tactical subversion.”
Misinformation is “false information that is spread, regardless of intent to mislead.”
Malinformation is information based on reality, but used to inflict harm on a person, organization or country.
Manipulation: A series of related techniques of creating an image or argument that favors somebody’s particular interests.
Information Operations (IO or soft power) includes influence the behavior of your adversary with the intent of impacting their decision-making. IO may include cyber attacks against target information systems and their ability to make timely and accurate decisions. IO is commonly associated with the disruption, corruption, or direct modification of the decision-making of your targets while protecting your own from the same fate.
Validated and registered students receive preparation information 1 week prior to class start.
Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors. This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome
ENROLLMENT MEANS TRAINING EULA ACCEPTANCE – STRICTLY ENFORCED
NOTICE: We use PayPal via our shopping cart. If you require different payment options, please email us at info AT treadstone71.com