Cognitive Warfare (CW)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

Cognitive Warfare (CW)

By: Gary A. Bonick JR. – 2024

Copyright © 2024
All of the links to my books, social media, merchandise, and
FREE video presentations can be found online in my
‘LinkTree’:
https://linktr.ee/GaryBonickJr
Cognitive Warfare (CW) is any military activities which specifically focus on manipulating
perceptions, beliefs, and decision-making processes to alter cognitive brain function.[1][2][3] This
has been referred to by NATO CMDR. Paul Grostad as “Hacking the OODA Loop.” [4] While
cognitive warfare is a form of PSYOP that utilize propaganda, disinformation, etc., it distinguishes
itself from other information related activities by its objectives — “its goal is not what individuals
think, but rather, the way they think.”[5] Cognitive Warfare refers to the way that human thought,
reasoning, sense-making, decision-making, and behaviour may be engineered through not only the
manipulation of information, but also by the A.I./ML network of algorithms which push
information through the internet.[1][2][3][5] Other methods of Cognitive Warfare include the
targeted use of inaudible sound waves and microwaves to incapacitate enemy forces by disrupting
the neurological functions of human targets without causing visible injury.[4][6][7] According to
the U.S. National Institute of Health, Infrasound’s effect on the human inner ear includes “vertigo,
imbalance, intolerable sensations, incapacitation, disorientation, nausea, vomiting, and bowel
spasm; and resonances in inner organs, such as the heart.” [6][7] Infrasound distinguishes itself
from other means of Cognitive Warfare by targeting individuals directly rather than employ
methods that rely on other media for impact — a subcategory of Cognitive Warfare weaponry that
has unofficially been called ‘neurostrike weapons.’

Difference Between CW & Other Information Related Activities

Cognitive Warfare evolves as an extension of information warfare (IW) and psychological


operations (PSYOPs).[3] Operations in the information environment are traditionally conducted in
five core capabilities — electronic warfare (EW), psychological operations (PSYOPs), military
deception (MILDEC), operational security (OPSEC), and computer network operations (CNO).[5][8]
So on one hand, information warfare aims at controlling the flow of information in support of
traditional military objectives, mainly to produce lethal effects on the battlefield.[5] On the other
hand, cognitive warfare degrades the capacity to know and produce foreknowledge, transforming
the understanding and interpretations of situations by individuals and in the mass consciousness.
[3][5] Rather than Weapons of Mass Destruction (WMD), scholars such as Dr. James Giordano call
this form of warfare “Weapons of Mass Disruption (WMD2)”.[9] And for this reason, academics
have called this, “the contemporary age of mutually assured destruction.”[1][2]

Cognitive Warfare Weaponry

When waged online, Cognitive Warfare starts with data.[1][2] When data is matched with
personally identifiable information (PII), A.I. predictive models can determine your private traits
and attributes such as personality and behavioural vulnerabilities. [1][2][10] Using this
psychological and psychographic profile, an influence campaign is created and adjusted in real
time by A.I. ML models until the desired cognitive and behaviour effects on the individual and/or
population are achieved.[1][2][5][11]
Red & Green indicators act as a “traffic light system” until the desired effects are achieved
on cognition and behaviour during Strategic Communications campaigns to Counter
Violent Extremism (CVE) & Counterinsurgeny (COIN)

These influence campaigns used in cognitive warfare and cognitive operations are executed
through the private influence industry known as Strategic Communications (StratCom).[1][2][12]
[13][37] Strategic Communications is utilized in multiple sectors as a method of advertising and
public relations.[1][2] So while Cognitive Warfare refers to these activities when used in military
settings, cognitive operations are not exclusive to the military ward.[1][2][5] There are multiple
methods used to achieve the desired affects in cognitive brain function through strategic
communications — two of the most notable being microtargeting and attitudinal inoculation.[1][2]
[5][14][37]

The effects of cognitive warfare & cognitive operations online are achieved through attitudinal
inoculation by using information for a conflicting purpose.[5][14] By using weak counterarguments
in the support of a narrative, the receiver seeks out identity supporting information that further
strengthens their threatened position — thus building psychological perseverance mechanisms
such as confirmation bias.[1][2][5] The held opinion, attitude, interpretation of events, etc. then
becomes resistant to a stronger attack (hence the medical terminology referring to a vaccine).[1]
[2][5] This methodology significantly increases the resilience of audiences and enables them to
withstand any attempts from others to change their opinions, decisions, interpretation of events,
etc.[1][2][3][5][14][15]
Microtargeting is a suggestive recommender algorithm (SeRA).[1][2] It’s similar to native
algorithms on websites that promote related content and suggested media based on not only
what you like, but also what people like who are similar to you. In the case of microtargeting,
rather than a user being provided content based on what a website’s algorithms predict that they
will like, they’re instead microtargeted messages from the website’s sponsors. Websites
essentially give this capability to the highest bidder as an advertising technique. But not all
‘sponsored’ material are labeled as such, and not all strategic communications campaigns are
designed to look like advertisements (primarily in political and military StratComs).[1][2][5]
When an audience is only microtargeted information that they are most likely to resonate with,
they are algorithmically segmented in to what’s known as online echochambers which don’t allow
the group to see a conflicting counterbalance of content.[14]

Algorithmically segmenting audience in to echochambers has defensive and offensive military


applications.[5] In military counteroperations such as counterinsurgency (COIN), the doctrine calls
to separate and isolate populations from one another both physically and psychologically.[5][16]
Not only does this prevent the threat network from recruiting neutral and friendly populations,
but is assists in the development of psychological perseverance mechanisms like confirmation bias
— “significantly, the methodology increases the resilience of susceptible audiences and enables
them to withstand foreign propaganda effects.”[1][2][14][15] In doing so, this helps
counterinsurgents & third-party counterinsurgents leverage the population and operational
environment against the threat network.[5][16]
But there are sociological and psychological side effects to these algorithms occurring in native
suggestive recommender systems and microtargeting alike. Decades of peer reviewed research
show that echochambers, in the physical world and online, cause asymmetric and political
polarization, extremism, confusion, dissonance, negative emotional responses (fear, anger, etc.),
reactance, microaggressions, and third-person effects.[17][18][19][20][21][22][23][24][25][26][27]
[28][29][30] And because of these psychological perseverance mechanisms like confirmations bias,
this can be very problematic based on the work of Nyhan & Reifler (2010). Nyhan & Reifler found
that even attempting to correct false beliefs often reinforces rather than dispels these beliefs
among those who hold them most strongly. This is known as the backfire effect — “in which
corrections actually increase misperceptions.”[31][32][33][34] Whereby, through confirmation
bias, these mechanisms utilized in military counteroperations actually lead to the backfire effect
and exacerbate the very issues they are attempting to counter — extremism, dissonance,
polarization, etc.[1][2][5]
Discussion on Mictotargeting | NATO’s Riga StratCom Dialogue | 11 June 2019

Ms. Anna Vladimirova-Kryukova is an associate of NATO StratCom and Data Protection Officer at
COBALT Latvia. When speaking at the 2019 Riga StratCom Dialog on strategic communications in
cognitive warfare settings, she asserts, “microtargeting really exists and it’s micro-effects also
exist. And yes it can actually impact you and the whole society.”[35] Anna continues at this NATO
conference, “in the case of microtargeting we really can manipulate the minds of people. And this
can lead to very serious results and very serious problems to wars and very serious conflicts,
biases and can also impact lives and can lead to losing lives. Or it can endanger lives. And
unfortunately I had such cases in my practice so its really happening.”[35]

And because these tactics are completely clandestine, this has blurred the threshold in terms of
reacting to these threats.[5][11] While Cognitive Warfare and Cognitive Operations may be
conducted online using the aforementioned methods, Cognitive Warfare can also be waged
through the use of sound weapons. China’s PLA has now officially incorporated the use of sound
weapons in to its arsenal of Cognitive Warfare weaponry.[6][7] Like the aforementioned methods
of Cognitive Warfare, sound weapons also incapacitate enemy forces by disrupting the
neurological functions of human targets without causing visible injury.[6][7] This has been referred
to as “Infrasound.”[6][7] Infrasound distinguishes itself from other means of Cognitive Warfare by
targeting individuals directly rather than employ methods that rely on other media for impact — a
subcategory of Cognitive Warfare weaponry that has unofficially been called ‘neurostrike
weapons.’ The South China Morning Post, reporting on the weapon, says it has no moving parts
— “Professor Xie Xiujuan, lead scientist on the project, said the device was powered by a tube-
shape vessel containing an inert gas. [7] When heated, the gas particles vibrate and a deep,
monotonous sound is emitted.” The Chinese scientists assert that the weapon, developed by the
Chinese Academy of Sciences’ Technical Institute of Physics and Chemistry, uses “focused waves of
low frequency sound” to cause “extreme discomfort, with vibrations in the eardrums, eyeballs,
stomach, liver, and brain.”[7] According to the U.S. National Institute of Health, frequencies must
be <20 Hz with exposures at 90 dB and higher — with the effects of Infrasound being achieved
within minutes.[6]
Objectives of CW & Downstream Effects

Objectives of Cognitive Warfare are to shape/control and enemy’s cognitive thinking and decision-
making; to manipulate and degrade a nation’s values, emotions, national spirit, cultural traditions,
historical beliefs, political will; to achieve adversarial strategic geopolitical objectives without
fighting; to influence human/societal reasoning, thinking, emotions, et. al. aligned with specific
objectives; and degrade a populations trust in their institutions.[3] In doing so, this allows for the
weakening/disruption of military, political & societal cohesion; and undermining/threatening of
democracy.[3] CW is also used to leverage extremist groups to create chaos, political violence, and
crisis.[5] Through CW, cultural genocide and be facilitated by targeting cognitive biases to create
hate and generate racism.[3]Cognitive warfare has also been used by authoritarian societies to
restructure society and groom populations to accept “continuous surveillance.”[3] Through
Cognitive Warfare, this allows these authoritarian societies to “remove individuals/outliers who
resist and insist on Freedom of Speech, Independent Thinking, etc.”[3] Some of the harmful effects
of cognitive warfare can be militated with cognitive security — cognitive resilience through
educational training in areas such as critical thinking, media literacy, awareness of these
capabilities, and other relevant topics.[1][2][3]

‘Cognitive Domain’ or ‘Cognitive Dimension’?

Traditionally, there are five domains of war where military actions are taken — Air, Land, Sea,
Space, and Cyberspace. These are spaces where warfare is traditionally waged. Actions taken in
these domains aim to achieve affects in one or more of the three dimensions of war — The human
dimension, the physical dimension, and the information dimension. But because “the brain is and
will be the 21st century battlescape ,”[9] western scholars and defense circles are now torn
between the addition of a new domain; some calling it the ‘cognitive domain,’ and others the
‘human domain.’ The Chinese military has made their own determination, deciding on the
cognitive domain with all activities therein called ‘cognitive domain operations (CDO)’.[36]

History of Cognitive Warfare weaponry

Cognitive warfare weaponry has multiple agnostic applications including commercial, political and
covert IW and CW military operations.[1][2][3][14][37] Gary Bonick JR. was the first to publish the
DARPA origins of this weaponry, exactly how it is deployed, and its impacts on mental health &
democracy.[1][2][37] DARPA began research and development on “sentiment detection and
opinion mining” for “influence operations” using automated & semi-automated systems on July
11, 2010, in a program called ‘Social Media in Strategic Communications (SMISC).[12][37]
Cognitive Warfare and Cognitive Operations are waged through the influence industry known as
Strategic Communications (StratCom).[1][2][12][37] The scope of DARPA’s SMISC program was to
create automated/semi-automated systems with regard to “influence operations” for the
purposes of “inducing identities” (engineering behaviour through identity politics), modeling these
“emergent communities,” creating “bots in social media”, “automated content generation”,
“sentiment detection and opinion mining”, “crowd sourcing,” and “narrative structure analysis,”
etc.[12][37] The Directorate of the U.S. National Science Foundation, Erwin Gianchandani, who has
published extensively and presented at numerous international conferences on the subject of
computational systems modeling of biological networks, has called this DARPA program “Warfare
from Social Media.”[13][37][38][39]

Just after the start of this SMISC program, DARPA, the Intelligence community, and Boeing
Phantom Works, began funding research at the University of Cambridge also for sentiment
detection and opinion mining.[40][41][42][43] This research began the breakthrough of
determining private traits and attributes from digital records of human behaviour.[10] This
allowed DARPAs SMISC platform the capability to target based on metrics of mental health gauged
by a Big 5 OCEAN score. An OCEAN score is a metric used by clinicians to diagnose personality and
behavioural disorders and/or vulnerabilities.
After the military funded technology was built, Cambridge University opened up a for-profit spin-
off of its Psychometrics Center called ‘Cambridge Personality Research.’ This wing of the University
offered something called “Preference” to political clients.[44] For a fee, this wing of the University
would leverage people’s data that it had gathered for academic purposes from Facebook, Twitter,
etc. and target political audiences based on metrics of mental health; amongst other categorical
variables.[44][45][46]
Other than the military-industrial complex, Facebook also partnered on this early cognitive
research.[47] And it was Facebook that ended up with the patent for it.[48]
The technology inevitably found its way from this milieu at Cambridge University to the premier
NATO military contractor known as SCL Group.[49][50][51] This contractor amalgamated this
OCEAN modeling it with its own version of SMISC weapon which it called the ‘Ripon Platform.’ [49]
[50][51][52][15] Until 2015, there was only one private military contractor in the world licensed to
deploy weapons-grade communications tactics — SCL Group.[15][54]

It was deemed “weapons grade communications tactics” and export controlled by the British
government.[15][54] The founder and owner of this premier NATO military contractor also
founded and owned the U.K. based Influence Advisory Council, advising on influence standards
and reviewing best practices of allied governments.[55][56][57] In 2015, the U.K. government
lifted the export designation — just before this company then bypassed U.S. election laws to
deploy these weapons-grade tactics on behalf of the Trump campaign in the 2016 U.S. presidential
election through a front facing shell company known as Cambridge Analytica.[54][58][59][60][61]
[62][63][64] During this 2016 presidential campaign, this premier NATO contractor targeted those
who scored highly neurotic on their OCEAN profiles — specifically targeting paranoid minded
individuals having paranoid ideations with fear-based information and disinformation.[14][54][65]
[66] A whistleblower from the company named Christopher Wylie came forward and explained on
multiple occasions why this demographic was being targeted with these cognitive warfare tactics
— “with the view that these are the people that Steve Bannon would be able to use in order to
spark an insurgency in the United States.”[67][68] Less than two years after his statements, the
United States saw what was determined to be an insurrection at the U.S. capital building in
Washington D.C., a trait of an insurgency.
During the presidential transition period just weeks after the 2016 U.S. presidential election,
Obama’s State Department signed a contract with this same military contractor to adopt its
strategies for the Global Engagement Center’s (GEC) to counter violent extremism. According to a
December 2016 no-bid contract for the DoS GEC, the State Department says that “In sum. After six
years of research and countless demonstrations by companies wishing to sell their services, the
GEC is not aware of any companies that approach the sophistication and effectiveness of SCL in
designing data-driven influence campaigns that demonstrably work.”[69][70]

The front facing shell company was brought to the attention of Congress, but the single hearing
they had on the matter consisted of data privacy protection rather than what was being done with
the data.[41] Congress was led to believe the military technology used in cognitive operations was
snake-oil, despite the aforementioned DoS comments and its premier status in the field of
Strategic Communications.[41] Because the front facing shell company of SCL Group went defunct
just prior to the hearing, U.S. Congress felt that no further action should be taken to investigate
the matter further — despite the U.K. Parliament determining:

“SCL’s alleged undermining of democracies in many countries, by the active manipulation


of the facts and events, was happening alongside work done by the SCL Group on behalf of
the UK Government, the US Government, and other allied governments. We do not have
the remit or the capacity to investigate these claims ourselves.”[71]
After this U.K. Parliament determination, a U.S. Congressional oversight hearing on the GEC
(having adopted SCL Group’s tactics) determined that those they contracted “were putting out
essentially disinformation rather than being the counter disinformation, including attacking and
smearing some U.S. citizens.”[53]
References:
1 Bonick JR, Gary. Political & Cognitive Warfare or Strategic Communications (English/Spanish).
ISBN 979–8321366752.
2 Bonick JR, Gary. The Political-Military Complex: A Retrospect of Counterinsurgency (COIN) and
Counter Violent Extremism (CVE). ISBN 979–8321176016.
3 Masakowski, Yvonne, PhD. “Newport Lecture Series: “Artificial Intelligence & Cognitive Warfare”
with Yvonne Masakowski”.
4 NATO CDR. Groestad, Paul. “CyCon 2022 DAY 3 Panel: Cognitive Warfare — Hacking the OODA
Loop”
5 “#RigaStratComDialogue | Strategy Talk by NATO General Paolo Ruggiero”
6 Mizokami, Kyle (September 25, 2019) | “So What Is This Secretive Chinese Sonic Weapon
Exactly?”| Popular Mechanics.
7 “Infrasound: Brief Review of Toxicological Literature” (PDF) | U.S. National Institute of Health.
November 2001 (PDF)
8 Wilson, Clay, ‘Information Operations, Electronic Warfare, and Cyberwar: Capabilities and
Related Policy Issues’, LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH
SERVICE, 2007 Mar 20
9 “Dr. James Giordano: The Brain is the Battlefield of the Future”
10 Michal Kosinski, David Stillwell, and Thore Graepel | PNAS | March 11, 2013. 201218772;
published ahead of print March 11, 2013. “Private traits and attributes are predictable from digital
records of human behavior”.
11 “Target Audience Analysis” — Joint Warfare Center (PDF)
12 “DARPA Solicitation — Social Media in Strategic communications”.
13 Gianchandani, Erwin. “DARPA: Learning Warfare from Social Media”.
14 “Cambridge Analytica whistleblower Christopher Wylie testifies before Congress — watch live”
15 “Countering propaganda: NATO spearheads use of behavioural change science” | Date: May 12,
2015
16 “Field Manual 3–24 | INSURGENCIES AND COUNTERING INSURGENCIES (MCWP 3–33.5) (THIS
ITEM IS PUBLISHED W/ BASIC INCL C1)” (PDF).
17 “Exposure to opposing views on social media can increase political polarization” | By:
Christopher A. Bail, Lisa P. Argyle, Taylor W. Brown, John P. Bumpus, Haohan Chen, M. B. Fallin
Hunzaker, Jaemin Lee, Marcus Mann, Friedolin Merhout, and Alexander Volfovsky | Edited by
Peter S. Bearman, Columbia University, New York, NY, and approved August 9, 2018 (received for
review March 20, 2018) | August 28, 2018 | 115 (37) 9216–9221
18 “Democracy for Realists: Why Elections Do Not Produce Responsive Government” | By: Achen
CH, Bartels LM | Princeton Univ Press, Princeton | 2016
19 “Public Opinion and Policy in the American States” | By: Erikson RS, Wright GC, McIver JP |
Cambridge University Press, Cambridge, UK | 1993
20 “When the People Speak: Deliberative Democracy and Public Consultation” | By: Fishkin JS |
Oxford University Press, Oxford | 2011
21 “A new era of minimal effects? The changing foundations of political communication” | J
Commun 58:707–731 | By: Bennett WL, Iyengar S | 2008
22 Sunstein C (2002) #Republic: Divided Democracy in the Age of Social Media | (Princeton Univ
Press, Princeton)
23 “The political blogosphere and the 2004 U.S. election: Divided they blog” | By: Adamic, L., &
Glance, N. | 2005, August 21 | Paper presented at the 3th International Workshop on Link
Discovery (pp. 36–43), Chicago, IL. New York, NY: ACM
24 “Anger, Fear, and Echo Chambers: The Emotional Basis for Online Behavior” | Social Media +
Society | April-June 2019: 1 –14 | By: Dag Wollebæk, Rune Karlsen, Kari Steen-Johnsen and
Bernard Enjolras
25 “Echo chambers in the age of misinformation” | By: Del Vicario, M., Bessi, A., Zollo, F., Petroni,
F., Scala, A., Caldarelli, G., & Quattrociocchi, W. | 2015 | arXivpreprint arXiv:1509.00189
26 “Mapping social dynamics on Facebook: The Brexit debate” | By: Del Vicario, M., Zollo, F.,
Caldarelli, G., Scala, A., & Quattrociocchi, W. | 2017 | ‘Social Networks,’ 50, 6–16.
27 “The filter bubble: What the Internet is hiding from you” | By: Pariser, E. | 2011 | New York,
NY: Penguin Press
28 “”The Law of Group Polarization” | By: Cass R. Sunstein | John M. Olin Program in Law and
Economics Working Paper №91, 1999".
29 “”Unintended Effects of Public Relations in Strategic Communication: A First Synthesis” | By: Jie
Xu | ‘Asia Pacific Public Relations Journal’, 2019, Vol 20, p1 | ISSN: 1440–4389" (PDF).
30 “Unintended Effects of Advertising: An Updated Qualitative Review” | By: Jie Xu | January 2020
| Review of Communication Research 8:1–16 | DOI:10.12840/ISSN.2255–4165.021
31 “When Corrections Fail: The Persistence of Political Misperceptions” | By: Nyhan Brendan,
Reifler Jason | 2010 | Political Behavior 32:303–30".
32 “The Backfire Effect” | By: Matthew Wills | April 3, 2017
33 “A dissonance analysis of the boomerang effect” | By: Cohen, Arthur R. | March 1962 | ‘Journal
of Personality’ 30 (1): 75–88 | Doi:10.1111/j.1467–6494.1962.tb02306.x. | PMID 13880221
34 Silverman, Craig (June 17, 2011). “The Backfire Effect: More on the press’s inability to debunk
bad information”. Columbia Journalism Review, Columbia University (New York City)
35 “Discussion. Microtargeting and the ethics of the attention economy.” | May 7, 2020 | ‘NATO
StratCom COE’ YouTube Channel | recording of a breakaway discussion from the “Riga StratCom
Dialogue 2019” that took place in Riga, June 11, 2019
36 Baughman, Josh. “How China Wins the Cognitive Domain” (PDF).
37 Bonick JR, Gary. History of Behavioural Engineering: Eugenics, The Mental Hygiene Movement
& the Tavistock Institute. ISBN 979–8322255901.
38 Gianchandani, Erwin. “UVA Alumnus Aims to Accelerate Breakthroughs in Critical and Emerging
Technologies as Head of New NSF Directorate”.
39 “Erwin Gianchandani — National Science Foundation”.
40 Kosinski, M., Wang, Y., Lakkaraju, H., & Leskovec, J. “Mining big data to extract patterns and
predict real-life outcomes”.
41 “Cambridge Analytica whistleblower Christopher Wylie testifies before Congress — watch live”.
42 “The business of social networking”.
43 “IMSC News — USC Infolab — University of Southern California | February 2000” (PDF).
44 “Homepage — Products/Services — Preference tool”
45 “Trait Prediction Engine” | University of Cambridge — The Psychometrics Center”.
46 “With friends like these…” | PUBLISHED: April 22, 2011 | University of Cambridge — ‘Research
News’
47 “CSAR Lecture: Dr. David Stilwell, on ‘Big Data Psychometrics’” | November 4, 2019 | ‘CSAR’
YouTube Channel
48 “US8825764B2 — Determining user personality characteristics from social networking system
communications and characteristics — Google Patents”
49 Albright, Jonathan (October 13, 2017). “Cambridge Analytica: the Geotargeting and Emotional
Data Mining Scripts”.
50 “Disinformation and ‘fake news’: Final Report Contents — Aggregate IQ”. Parliament.uk.
51 Locklear, Mallory (April 13, 2018). “A look at the ad-targeting tools AggregateIQ left exposed
online”. Engadget.
52 “Digital, Culture, Media and Sport Committee” | Wednesday May 2, 2018, Meeting started at
2.36pm, ended 4.16pm | Witnesses: Chris Vickery, Director, Cyber Risk Research, UpGuard
53 “THE GLOBAL ENGAGEMENT CENTER: LEADING THE UNITED STATES GOVERNMENT’S FIGHT
AGAINST GLOBAL DISINFORMATION THREAT” | Senate Hearing 116–275 | From the U.S.
Government Publishing Office | March, 5th 2020
54 “Digital, Culture, Media and Sport Committee Hearing | Tuesday April 17, 2018, Meeting
started at 10.51am, ended 1.34pm”.
55 “Three Crucial Questions about Target Audience Analysis” (PDF).
56 Influence Advisory Panel — ‘The Panel’
57 Influence Advisory Panel — ‘Nigel Oakes.’
58 “Disinformation and ‘fake news’: Final Report — Digital, Culture, Media and Sport Committee”
59 “A RESPONSE TO MISSTATEMENTS IN RELATION TO CAMBRIDGE ANALYTICA” (PDF)
60 “THE DARK TRUTH ABOUT CAMBRIDGE ANALYTICA’S TIES TO TRUMPWORLD” | BY: MAYA
KOSOFF | May 23, 2018, 12:28 PM
61 “Trump camp paid $5.9m to cambridge analytica from July 29 through Dec 12, 2016. Before
then, ZERO h/t @lachlan” | ‘Sam Stein’ Twitter Post | @samstein
62 “After working for Trump’s campaign, British data firm eyes new U.S. government contracts” |
By: Matea Gold and Frances Stead Sellers | February 17, 2017, at 6:03 p.m. EST”.
63 “OFFICE OF THE DEMOCRATIC LEADER | Interview of CHRISTOPHER WYLIE” (PDF).
64 “”INTERVIEW OF ALEXANDER NIX” | U.S. House of Representatives, Permanent Select
Committee on Intelligence, Washington, D.C. | Thursday, December 14, 2017" (PDF).
65 “”Whistleblower: Cambridge Analytica Aimed To Trigger Paranoia And Racial Biases” | May 16,
2018 10:50 AM ET | By: Laura Sydell, Ian Wren”.
66 “”Written Statement to the United States Committee on the Judiciary | In the Matter of
Cambridge Analytica and other Related Issues””.
67 “”Christoper Wylie: Cambridge Analytica | The Project” | November 28, 2019 | ‘The Project’
YouTube Channel”.
68 “”Whistleblower Explains How Cambridge Analytica Helped Fuel U.S. ‘Insurgency’” | October 8,
20192:45 PM ET | Heard on Fresh Air | By: Terry Gross”.
69 “U.S. Department of State Case #: F-2017–05742 | Doc #: C06612648 | July 30, 2018”.
70 “”Research, Strategy and Analysis | U.S. Department of State | Office of The Under Secretary
for Public Diplomacy and Public Affairs | Global Engagement Center (GEC)”.
71 “”Disinformation and ‘fake news’: Interim Report” | DCMS Committee | Fifth Report of Session
2017–19 | HC 363 | July 29, 2018" (PDF).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy