CogWar

<p>Dive into the mind-bending world of Cognitive Warfare, where manipulation, disinformation, and the clash of signals and noise shape our reality. This podcast unravels the intricate web of how it all connects, blending academic insights with the pulse of today’s headlines. Join us as we decode the hidden forces at play in our world.</p><p><br /></p><hr /><p style="color: grey; font-size: 0.75em;"> Hosted on Acast. See <a href="https://acast.com/privacy" rel="noopener noreferrer" style="color: grey;" target="_blank">acast.com/privacy</a> for more information.</p>

The Political Economy of Influence & Counter FIMI Institutions

In this thought-provoking first installment of a two-part series, hosts dive deep into the myths and realities of free speech, influence systems, and the digital battlegrounds shaping our world. Kicking off with a poignant quote from philosopher Ivan Illich on how technology disrupts the "commons" of silence, the episode challenges simplistic notions of democracy and unrestricted expression. Hosted on Acast. See acast.com/privacy for more information.

12-04
01:46:57

Eating the elephant

In this episode of Cog War, titled "Eating the Elephant: Conceptualising Disorder," hosts James and Raymond reflect on a recent workshop at Lancaster University exploring the new world order, or disorder. Drawing from military theories like cognitive warfare, reflective control, and unrestricted warfare, they critique gaps in the field: the lack of institutional coordination against cross-domain attacks, the West's defensive stance without offensive strategies, and hypocrisy in blaming foreign tech while ignoring domestic AI and social media's cognitive impacts.They challenge technological determinism, arguing that platforms amplify pre-existing social fractures, from mental health declines to eroded institutional trust. With examples from revolutions, genocides, and elections, they call for a holistic, self-reflective approach to this fuzzy domain.Join the conversation on navigating cognitive threats in a multipolar world. Hosted on Acast. See acast.com/privacy for more information.

11-03
48:22

Client-Side Scanning, the Moral Character of Cryptographic Work – Part 2

In this episode, hosts Raymond and James continue their deep dive from Part 1, exploring the nuanced political and economic implications of cryptography, client-side scanning (CSS), and its broader societal impacts. They emphasize that the technical arguments from Part 1 (regarding challenges and the tension between privacy and government access) still stand, but warn against a simplistic black-and-white view that could lead to alternative dystopias.Key Points:Reference to Philip Rogaway's Paper (2015): The discussion draws on Rogaway's "The Moral Character of Cryptographic Work," where he reflects on how cryptography, intended to prevent totalitarianism (inspired by cypherpunk ideals), has instead entrenched surveillance post-Snowden leaks. Cryptographers excel in technical analysis but fall short in political scrutiny.Limitations of Cryptography: Cryptography prevents unauthorized centralization of communications (e.g., governments reading messages) but ignores authorized centralization. Tech giants like Facebook collect metadata (who you communicate with, not the content), enabling pattern detection and power through inferences. This creates an imbalance where cryptography bolsters big tech's dominance over states.Crypto Wars as a Power Struggle: The conflict isn't just activists versus governments but a battle between states and tech corporations over evidence standards. Metadata alone makes it harder for states to prove intent (mens rea), while companies use it for predictions. End-to-end encryption weakens state power but strengthens corporate influence.Atomizing Effect and Libertarian Dystopias: Cryptography individualizes communication, making collective action harder and favoring those with the most resources (compute, energy, bandwidth). They reference historian Quinn Slobodian and critique visions from libertarians like Peter Thiel or Murray Rothbard, where decentralization could lead to "might makes right" societies. Examples include Bitcoin, where those with the most power win (51% attacks), and DAOs (Decentralized Autonomous Organizations) that render systems fragile in crises (e.g., the 2008 financial crash).Code as Law and Financialization: Cryptocurrencies emerged as a response to 2008, aiming to replace law with immutable code. However, legal analyses reveal they lack underlying value (no "potato in the field"), relying on the "greater fool" theory, new investors must inject money for old ones to profit. This makes systems unstable, and cryptography hinders rapid changes during crises.Comparison to Firearms (Second Amendment): Arguments for cryptography mirror those for gun rights,it protects freedom against tyrannical states. But this invites regulations, like the Danish justice minister's proposal to limit access. Cryptography can cause harm (e.g., cybercrime, terrorism, CSAM), but cryptographers distrust unverifiable government data on these issues. They also discuss biopolitics: Cryptography may invite suspicion toward marginalized groups (e.g., queer or people of color).Conclusion: Cryptography resists authoritarian dystopias but may enable fragmented, libertarian ones (e.g., "The Network State"). It's a balancing act; the technology doesn't solve everything and requires interdisciplinary analysis (math + social sciences). The episode stresses that issues like CSAM are real, not just rhetorical, and calls for nuanced debate. Hosted on Acast. See acast.com/privacy for more information.

09-29
50:08

Crypto Wars, Client-Side Scanning, and the Moral Character of Cryptographic Work: part 1

In this episode of Cog War, hosts Raymond and James dive into the complex and contentious topic of the "Crypto Wars," focusing on the EU's proposed Regulation to Prevent and Combat Child Sex Abuse, often referred to as "chat control" or client-side scanning. This regulation, driven by the Danish presidency of the European Parliament, aims to address serious issues like Child Sexual Abuse Materials (CSAM), terrorism, grooming, and other online crimes but raises significant concerns about privacy, trust, and the integrity of cryptographic systems.The episode explores the historical context of the Crypto Wars, starting from the 1990s when cryptography was treated as a military asset in the US, leading to legal battles over tools like PGP (Pretty Good Privacy). The hosts discuss how the current debate centers on client-side scanning, a technology proposed by Apple in 2021 to detect CSAM in encrypted communications without directly breaking encryption. This involves inserting an intermediary system between user input and encryption, which scans for specific content signatures. However, this approach has sparked fierce opposition from cryptographers, who argue it undermines the trust and security built into end-to-end encryption.Key points include:Technical and Philosophical Concerns: Client-side scanning moves trust outside the cryptographic system, relying on external databases of hashed signatures that cannot be mathematically verified. This creates risks of misuse, such as governments or corporations adding non-CSAM content (e.g., specific words or political phrases) to these databases, potentially leading to surveillance overreach.Political Implications: The hosts frame the debate through three lenses:Affective Arguments: The visceral reaction to privacy violations, akin to someone reading your diary, though this argument has evolved with changing internet norms and younger generations' familiarity with surveillance.Turnkey Tyranny: Drawing on Edward Snowden’s warnings, the episode highlights fears that weakened cryptography could enable future authoritarian abuses, citing examples like period-tracking apps being subpoenaed post-Dobbs decision.Rights-Based Perspective: Cryptography is seen as a negative right, protecting individuals from unauthorized state intrusion, akin to the US Second Amendment’s role in resisting centralized power.The "Four Horsemen" of the Info-Apocalypse: The episode addresses the main arguments for weakening cryptography, intellectual property violations, terrorism, CSAM, and crime. While acknowledging the severity of issues like CSAM, the hosts stress the need for human accountability and context in investigations, as algorithms lack the nuance to avoid misinterpretations or false positives.Global and Geopolitical Risks: The EU’s proposal could set a precedent for authoritarian regimes to demand similar access to encrypted communications, expanding surveillance beyond its intended scope. The hosts also warn of the technical challenges, such as the need for mass packet scanning akin to China’s Great Firewall.Content Warning: This episode includes discussions of sensitive topics like CSAM, terrorism, grooming, and Hurt Core, with a clap to signal sections listeners may wish to skip. Hosted on Acast. See acast.com/privacy for more information.

09-14
01:43:36

Infrastructure of reason

In this episode of CogWar, we delve into "The Infrastructure of Reason," exploring how media, disinformation rubrics, and state-controlled narratives shape our thinking and national identities. Drawing on Orwell vs. Huxley, Neil Postman's insights, and Ernest Renan's views on collective memory, we examine the frictionless spread of propaganda, like Israel's Hasbara strategies, and the double binds of trusting experts while navigating biased sources. From NYT language biases to AI-driven targeting, we question: How much control do we truly have over the artifacts that build our convictions? A provocative look at epistemology in a distracted world.The sources we have used in this episode is : https://www.who.int/news-room/spotlight/let-s-flatten-the-infodemic-curveThe Israel Projects 2009. Global-language-dictionary : Free Download, Borrow, and Streaming : Internet Archive Hosted on Acast. See acast.com/privacy for more information.

09-05
01:06:04

Firebreaks

In this episode of CogWAR, the hosts from Norway and England compare their countries' approaches to social cohesion and disinformation, focusing on the UK's 2024 Khan Review and Norway's disinformation strategies. The discussion explores how attention drives cognitive warfare, affecting both the public and politicians. Key points include:Attention and Cognitive Vulnerabilities: Politicians, like the public, are susceptible to attention-grabbing mechanisms and addictive behaviors on platforms like social media, impacting their decision-making.UK’s Khan Review: Analyzes social cohesion through "freedom restricting harassment," where mob attacks erode trust across societal levels, from local communities to national institutions. It critiques the report for focusing narrowly on harassment without addressing how debates are resolved or tied to societal values.Norway’s Approach: Emphasizes media literacy and institutional trust but lacks focus on cultural reinforcement. Free speech debates in Norway center on pro- and anti-censorship views, contrasting with the UK’s complex cancel culture dynamics.Internal vs. External Threats: The episode highlights how internal trust breakdowns, like politicians ignoring certain groups, amplify disinformation risks, with the UK lacking "firebreaks" (community mediators) compared to Norway’s distributed model.Feedback Loops: The globalized internet enables ignored groups to gain attention from adversaries, creating new epistemologies that challenge societal cohesion.The episode underscores the need for mediators to counter disinformation and rebuild trust, contrasting Norway’s community-focused strategies with the UK’s centralized, less effective approach. Hosted on Acast. See acast.com/privacy for more information.

08-18
01:04:55

Into Cerberus Lair

In Episode 3 of Cog War, hosts Raymond and James delve into the essence of security amid cognitive warfare and disinformation. Drawing on Graham Smith's paper "Into Cerberus's Lair," they use the Cerberus metaphor to frame security as a guardian of societal values and boundaries. Discussions span Norwegian cultural tools like Dugnad and Janteloven for building shared realities, trust erosion in media literacy, and real-world examples from Bitcoin debates to AI-generated papers. They explore how new communication mediums destabilize orders, emphasizing collective understanding over individual rubrics. Hosted on Acast. See acast.com/privacy for more information.

08-07
01:12:46

Norway's Strategy Against Disinformation (2025-2030)

In this episode, hosts Raymond and James dive into Norway’s new strategy for building resilience against disinformation from 2025 to 2030. They explore its five key areas: enhancing critical media literacy, holding social media accountable, strengthening editorial media, advancing research, and improving government coordination. With a focus on Norway’s unique cultural strengths and the challenges of combating cognitive warfare, they discuss the strategy’s holistic approach, its strengths, and areas for improvement in navigating the complex media landscape Hosted on Acast. See acast.com/privacy for more information.

07-25
01:04:55

CogWar: Why do they do this?

What is cognitive warfare, and why should you care? In this opening episode, Raymond Hagen and Dr. James Wright dissect the evolving battlefield of minds, not missiles. From China’s “Unrestricted Warfare” to Russia’s reflexive control, we explore how narratives, trust, and perception are being weaponized. Is this just about elections and disinformation, or is the entire information ecosystem at stake, including AI and domestic institutions? Tune in for a deep, critical, and thought-provoking journey into the frontlines of cognitive conflict. Hosted on Acast. See acast.com/privacy for more information.

07-07
01:12:14

Recommend Channels