Cognitive Intelligence: Mapping Human Decision-Making
- Emerging Risks Global

- 5 days ago
- 5 min read

The Blueprint of the Mind: From Propaganda to Cognitive Intelligence (COGINT)
Geopolitical competition is transitioning from the cyber domain, which targeted data, to the cognitive domain, which targets decision-making. A pivotal report by NATO’s Chief Scientist on cognitive warfare delineates a departure from traditional influence operations. While propaganda historically aimed to change public beliefs, cognitive warfare targets the very architecture of choice: how populations decide what to believe.
This article introduces Cognitive Autonomy as a strategic imperative, arguing that national security must expand beyond network integrity to secure the human capacity for independent sense-making and critical thought. The rise of Cognitive Intelligence (COGINT) is proposed to map and defend this newly defined battlespace.
A few weeks ago, NATO's Chief Scientist released a report on cognitive warfare that demands profound recalibration of our strategic frameworks. The document's language is measured, avoiding the alarmist hyperbole that often clouds discussions of disinformation. Yet, its implications are seismic: it describes a threat that has been in operation for years, but which most institutions—public and private—still relegate to the margins.
The core argument is straightforward but revolutionary: shaping how populations perceive reality, make decisions, and hold together as a society is no longer a peripheral tactic; it has become the central element of strategic competition. This represents a meaningful departure from what we have historically categorised as propaganda. Propaganda was outcome-oriented: it sought to change what you believe, often by saturating the information ecosystem with overt falsehoods or skewed narratives.
Cognitive warfare is process-oriented. It goes after something far more fundamental. It does not merely seek to insert a single false narrative into the public sphere; it asks how an individual or society decides what to believe, and then quietly, systemically, reshapes that very process.
The distinction sounds abstract until one looks at how it is applied in practice. Adversaries map behavioural patterns at scale, using data analytics and artificial intelligence (AI). They do not necessarily need overtly false content to be effective. They require calibrated content—information algorithmically optimised for how an individual personally processes information, experiences emotional resonance, and assesses risk. Your decisions feel reasoned. They feel authentic. But the framework within which you are reasoning has been shaped by an external actor. This article lays the foundation for a 12-part series on securing the cognitive domain.
Defending Cognitive Autonomy: Sovereignty of the Self
In the physical domain, sovereignty is defined by borders; an invasion is a clear kinetic trigger. In the cyber domain, sovereignty is defined by network integrity; a breach triggers a cybersecurity protocol. But what is sovereignty in the cognitive domain?
The inability of existing legal and strategic frameworks to define 'cognitive harm,' much less develop proportional responses, is precisely what makes cognitive warfare an ideal tool for grey zone competition. There is no physical trigger. The targeting is diffuse. Attribution is elusive.
The series is built upon a new concept: Cognitive Autonomy: the capacity of individuals and societies to self-govern their internal thought processes, free from covert algorithmic, adversarial, or systemic interference. This is not a concept born of paranoia. It is an acknowledgement that digital infrastructure, far from neutral, carries embedded values, assumptions, and algorithmic biases that are baked into the design long before a user interacts with them. When adversaries weaponise this infrastructure, they do not hack devices; they hack the environment that shapes our minds.
Hacking the ORIENT Phase: The Threat to Sense-Making
In military decision theory, the OODA loop (Observe, Orient, Decide, Act) describes the decision cycle. In standard informational competition, electronic warfare has historically targeted the Observe phase by blinding radars, and cyber warfare has often targeted the Act phase by disabling command systems. Cognitive warfare, by contrast, targets the most complex phase of the loop: Orient.
The Orientation phase is where sense-making happens. It is the complex process through which an individual synthesises new data with their cultural heritage, previous experiences, emotional state, and predispositions to create a unique worldview. By subtly manipulating the Orientation process of entire populations, adversaries can ensure that the subsequent Decide and Act phases naturally align with their strategic intent, without ever issuing a command.
This manipulation is achieved by exploiting human neurobiology. Threat actors utilise AI to map the emotional states of communities in near real-time. By feeding them calibrated, though not necessarily false, information designed to induce constant, low-level emotional friction, they degrade executive function and induce cognitive fatigue. When the human brain is emotionally heightened and fatigued, its capacity for analytical thought is bypassed. Rational sense-making is overridden by the amygdala, pushing populations toward instinctual, polarised, and highly predictable reactions.
The target is not data; it is the human capacity for reflection.
Human Factors: The Sense-Making Defensive Model
If the strategic objective of cognitive warfare is to degrade sense-making, the primary line of defence must be the enhancement of the public's sense-making capabilities.
Sense-making is the continuous effort to understand the connections among people, places, and events in order to anticipate trajectories and act effectively. In an era of informational abundance and synthetic realities (AI-generated text, deepfakes, large language models), sense-making is under unprecedented siege.
Currently, fact-checking is the primary institutional response. However, fact-checking is a reactive posture that addresses the symptom (disinformation) rather than the systemic vulnerability (cognitive process). It implicitly assumes the target is a passive recipient who will self-correct once presented with "truth."
However, individuals are active particles in a complex adaptive system. Defensive grand strategy must move beyond a fact-checking model towards a Process-Checking model. This is the foundation of the human factors approach of the series: how societies and organisations can promote sense-making, analytical thought, and critical decision-making by introducing cognitive friction.
Friction is essential. The modern digital economy prioritises algorithmic speed, delivery efficiency, and emotional reactivity. Defensive design must prioritise the exact opposite. Process-checking means introducing deliberate friction in the user experience of digital platforms—slowing down the delivery of emotionally heightened content and explicitly teaching populations to manage emotional regulation. We must teach the process: identifying confirmation bias, understanding emotional manipulation techniques, and recognising algorithmic reinforcement loops. Fact-checking without process-checking is a firewall built on a compromised operating system.
Securing the Mindset: Introducing Cognitive Intelligence (COGINT)
The recognition of cognitive warfare as a serious concern demands the creation of a new intelligence discipline: Cognitive Intelligence (COGINT). Just as SIGINT monitors signals, COGINT must focus on mapping and defending human decision-making architecture. It is an operational discipline that analyses systemic vulnerabilities in how societal and organisational decision-makers process information and reality.
The question for leaders, in government, the private sector, and civil society, is whether their organisations are treating cognitive security as a core function or still relegating it to the margins of public relations. Most organisations invest heavily in protecting data networks. Far fewer invest comparably in protecting the human mindset that sits at the end of every pipe, tasked with interpreting that data.
We spend billions constructing firewalls to protect data; it is time we start constructing firewalls to protect the minds that process it.




Comments