top of page

THE MYTH OF THE PASSIVE VICTIM: STRATEGIES FOR PSYCHOLOGICAL RESISTANCE


The dominant narrative about cognitive warfare casts ordinary people as helpless targets—passive recipients of manipulation who can be protected only by governments, platforms and experts. This narrative is wrong and it is dangerous. It is wrong because the evidence shows that individuals possess a repertoire of psychological resistance strategies that, when activated, substantially reduce susceptibility to manipulation. It is dangerous because treating people as passive victims creates a self-fulfilling prophecy: populations that believe they cannot resist manipulation are less likely to try and institutions that believe populations cannot resist are more likely to pursue paternalistic interventions that undermine the democratic agency they claim to protect.


This article surveys what the psychological evidence tells us about how individuals actually resist cognitive manipulation—and what security professionals and policymakers can do to activate and strengthen these capacities rather than bypass them.


Four Clusters Of Resistance

The research literature on resistance to persuasion and manipulation identifies four broad clusters of strategies that individuals deploy, often unconsciously, when they encounter content designed to influence their attitudes or behaviour. Understanding these clusters is essential for anyone designing counter-cognitive warfare programmes, because effective intervention strengthens natural resistance rather than replacing it with institutional control.


The first cluster is avoidance. The simplest form of resistance is not engaging with manipulative content in the first place. Avoidance strategies include selective exposure—choosing information sources that are trusted and avoiding those perceived as manipulative—and cognitive disengagement—mentally tuning out content recognised as an influence attempt. Avoidance is the most common resistance strategy in everyday life. Most people do not carefully evaluate every piece of content they encounter; they filter it through habitual source preferences and attention allocation patterns.

Avoidance has real value as a first-line defence. A population that habitually avoids low-credibility sources is harder to manipulate than one that engages indiscriminately. But avoidance has significant limitations. It depends on the individual's ability to identify manipulative content before engaging with it—a capacity that is increasingly challenged by the sophistication of AI-generated material and the blurring of legitimate and manipulated content on social media platforms. Avoidance can also produce its own pathologies: excessive avoidance of challenging information creates the filter bubbles and echo chambers that cognitive warfare exploits.


The second cluster is contesting. Contesting strategies involve actively arguing against manipulative content—generating counterarguments, identifying logical fallacies, questioning the source's credibility and motives. This is the resistance strategy that most educational interventions target: critical thinking, media literacy and prebunking all work by strengthening the individual's capacity to contest manipulative claims.

Contesting is powerful when it works. An individual who can articulate why a claim is misleading—who can identify the manipulation technique, question the source and generate an alternative explanation—is substantially more resistant than one who simply feels uncomfortable with the content but cannot explain why. The prebunking evidence is clear on this: pre-emptive exposure to manipulation techniques builds measurable resistance by equipping individuals with contesting resources.


The limitation of contesting is that it is cognitively expensive. It requires effortful, deliberate processing—the kind of thinking that cognitive fatigue degrades and that information overload makes impractical for the volume of content individuals encounter daily. You cannot critically evaluate every post in a social media feed. The mismatch between the volume of potentially manipulative content and the cognitive resources available for contesting it is structural and it means that contesting alone cannot be a comprehensive defence.


The third cluster is biased processing. This is the most psychologically complex and strategically ambiguous of the four clusters. Biased processing strategies involve evaluating information through the lens of existing beliefs, attitudes and identity commitments—accepting information that confirms prior views and rejecting information that challenges them. In the resistance literature, this is sometimes called "motivated reasoning" or "identity-protective cognition."


Biased processing is a genuine resistance mechanism: it prevents external influence from easily overriding existing beliefs. A committed environmentalist is resistant to fossil fuel industry messaging not because she has critically evaluated the evidence but because the messaging conflicts with her identity commitments and is therefore rejected automatically. This kind of resistance is fast, automatic and cognitively cheap—which makes it robust against the fatigue and overload that degrade contesting strategies.


The problem, of course, is obvious. Biased processing protects against influence that contradicts existing beliefs, but it also prevents updating in response to legitimate evidence. And it creates the very vulnerability that cognitive warfare exploits: identity-protective cognition makes individuals susceptible to manipulation that aligns with their existing commitments. An adversary that understands a target's identity structure does not try to change their mind. It offers content that confirms and intensifies their existing position—pushing them further into polarisation rather than trying to move them across a divide.


The fourth cluster is empowerment. Empowerment strategies involve strengthening the individual's confidence in their own judgment, their sense of agency over their information environment and their capacity for independent evaluation. This is qualitatively different from the other three clusters. Avoidance, contesting and biased processing are reactive—they operate on incoming information. Empowerment is proactive—it changes the individual's relationship to their information environment.

Empowerment strategies include self-affirmation (strengthening core values and identity in ways that reduce the need for identity-protective cognition), autonomy assertion (exercising deliberate choice over information consumption rather than accepting algorithmic curation) and efficacy building (developing the confidence that one's evaluative capacities are adequate to the task). The evidence suggests that empowered individuals are more resistant to manipulation across all categories—not because they deploy a specific resistance technique but because they approach their information environment from a position of psychological security rather than anxiety.


What This Means For Intervention Design

Most current counter-cognitive warfare interventions operate on a narrow slice of the resistance repertoire. Media literacy programmes focus on contesting. Prebunking focuses on contesting. Content moderation removes material before avoidance is needed. Algorithmic regulation addresses the system architecture. None of these is wrong, but the exclusive focus on contesting strategies produces interventions that are cognitively demanding, that fade without reinforcement and that leave the other three resistance clusters unaddressed.


A more comprehensive approach would design interventions that activate and strengthen all four clusters. For avoidance, this means developing tools and habits that make source evaluation automatic rather than effortful. Browser extensions that flag low-credibility sources, platform features that display provenance information and social norms that stigmatise sharing unverified content all lower the cognitive cost of avoidance. The goal is to make the resilient choice the default choice—not to demand that individuals invest scarce cognitive resources in evaluating every piece of content.

For contesting, the prebunking evidence is strong and should be scaled. But the evidence also shows that contesting interventions need reinforcement—single-dose prebunking fades within weeks. Sustainable contesting capacity requires institutional embedding: media literacy integrated into educational curricula at every level, ongoing public communication campaigns that explain manipulation techniques as they evolve and professional development programmes that build contesting skills in high-influence populations—journalists, educators, public officials, community leaders.


For biased processing, the goal is not to eliminate it—that is neither possible nor desirable, since some degree of prior-belief-based filtering is essential for managing information overload. The goal is to mitigate its pathological forms: the extreme identity-protective cognition that makes individuals susceptible to manipulation aligned with their identity commitments. The most promising approaches work indirectly, by reducing the threat that drives identity-protective cognition. When individuals feel secure in their identity, they are less likely to engage in defensive processing and more open to evaluating information on its merits. This means that interventions addressing economic insecurity, social belonging and community cohesion have indirect but real effects on cognitive resistance.


For empowerment, the implication is that counter-cognitive warfare programmes should aim to strengthen individuals' sense of agency over their information environment rather than positioning them as passive beneficiaries of institutional protection. Participatory approaches—citizen assemblies on information governance, user-controlled algorithmic preferences, transparent content moderation processes—build the kind of ownership and efficacy that empowerment strategies require. People who feel they have a stake in the integrity of their information environment are more motivated to protect it than people who feel it is someone else's responsibility.


The Agency Question

There is a deeper question here and it runs through the entire cognitive warfare debate: do we trust democratic publics to be agents of their own cognitive defence, or do we treat them as populations to be managed?


The paternalistic approach—which dominates current policy thinking—assumes that the public cannot be trusted to navigate complex information environments without institutional guidance. This leads to content moderation, algorithmic regulation and state-led counter-messaging programmes that position institutions as the guardians of cognitive integrity. The approach has a logic: the threat is sophisticated, the information environment is complex and individual cognitive resources are limited.


But paternalism has costs. It concentrates epistemic authority in institutions whose credibility is already contested. It positions citizens as objects of protection rather than subjects of their own political life. And it creates the precise dynamic that cognitive warfare exploits: populations that have outsourced their cognitive defence to institutions they do not fully trust are more, not less, vulnerable when those institutions are targeted.

The agency approach starts from a different premise: that individuals possess genuine resistance capacities that can be strengthened and that the most durable form of cognitive defence is a population that is equipped, confident and motivated to exercise its own judgment. This does not mean abandoning institutional responsibility—platforms must be regulated, adversary operations must be disrupted and public communication must be competent. It means designing these institutional interventions to enhance individual agency rather than replace it.


The Resilient Individual And The Resilient Society

The myth of the passive victim serves interests on both sides of the cognitive warfare divide. For the adversary, it promotes a sense of helplessness that reduces resistance. For the defender, it justifies institutional control over information environments. Both framings diminish democratic agency.


The evidence suggests a more complex and more hopeful picture. Individuals are neither helpless nor invulnerable. They possess a repertoire of resistance strategies—avoidance, contesting, biased processing and empowerment—that vary in their effectiveness depending on context, cognitive load and the nature of the manipulation. Effective counter-cognitive warfare strategy works with this repertoire rather than around it, strengthening natural capacities and creating environments in which resistance is easier to sustain.


The societies that will prove most resilient to cognitive warfare will not be those with the best content moderation systems or the most sophisticated government counter-messaging. They will be those that invested in their citizens' capacity and confidence to think for themselves—and that had the courage to trust the result.

 
 
 

Comments


business-people-working-data-project.jpg

REQUEST ERG'S SECURITY CONVERGENCE EXPERTISE

Receive tailored, intelligence-led and risk-based
security advice, designed 
to meet your requirements

 

Get in touch with us and we will assist you further.

Security Education, Risk, Resilience Awareness and Culture

Address

Southgate Chambers, 37-39 Southgate Street, Winchester, England, SO23 9EH

EMERGING RISKS GLOBAL ®

Emerging Risks Global ® (ERG) is a trading name of Woodlands International Ltd ©

Registered in England and Wales: 11256211.

VAT GB 507 077 204

Connect With Us

  • Instagram

This website and its content is copyright of  Woodlands International Ltd ©. 2025  All rights reserved. 

bottom of page