AI

Weaponizing Heritage in Online Cognitive Warfare

Abstract:

This theoretical paper reviews prior research on cognitive warfare and related fields, arguing that modern conflict increasingly targets human cognition and heritage through AI‑enabled information operations. Heritage becomes both a material and symbolic instrument, with disinformation shaping perceptions of its protection or destruction to justify strategic actions. Digital platforms, through influencers, bots, deepfakes, and algorithmic amplification, intensify these tactics by manipulating narratives, identities, and emotions at scale. Such cognitive operations complement kinetic actions, creating fragmented information environments where narrative control may rival territorial control in strategic importance. Emerging threats include cyberattacks on archives and metadata manipulation, underscoring the need for integrated measures that combine technological security with cultural and societal resilience.

Social Murder in Another Century: Technologies That Enable Misinformation to Instigate Assault

Abstract:

Social media is currently understood as a potential path to extremist beliefs, which sometimes lead to violent action. Current enabling technologies of Internet infrastructure, personalized advertisement targeting, and AI generated text and images allow for the previously expensive process of instigating extremism to be done via online services for exponentially less time and resources than previously possible. The historical context that ‘approves’ murder is explored with foci on modern engagements. This includes modern calls to violence. The specificity of the call to violence is explored. A hypothethical case study is presented as an example for a potential call to violence.

Adversarial Artificial Intelligence: State of the Malpractice

Abstract:

ArtificialIntelligence (AI), widely deployed in society, is rapidly becoming the next major battleground. Our society depends on the power of AI to solve problems in multiple domains—including commercial, infrastructural, and military systems. But AI is also vulnerable to a variety of attacks, some of which are common across many types and deployments of AI.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS
ICT

M

N

NEC
NSA
NSS

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com