Hostname: page-component-76fb5796d-r6qrq Total loading time: 0 Render date: 2024-04-26T19:42:41.370Z Has data issue: false hasContentIssue false

Neurocognitive hacking

A new capability in cyber conflict?

Published online by Cambridge University Press:  16 April 2020

John J. Heslen*
Affiliation:
Augusta University
*
Correspondence: John J. Heslen, Augusta, Department of Social Sciences, Political Science, 1120 15th Street, Augusta, Georgia, 30904-4562. Email: jheslen@augusta.edu
Get access

Abstract

This article presents a discussion of neurocognitive hacking and its potential for use at the strategic, operational, and tactical levels of cyber conflict. Neurocognitive hacking refers to the ability to activate specific neural areas of the brain, via subliminal or supraliminal stimuli, to shape the behavioral outcomes of an adversary. Research suggests that awareness of mortality-related stimuli has neural correlates in the right amygdala and left anterior cingulate cortex and mediates negative behavior toward out-group members, including unconscious discriminatory behavior. Given its in-group/out-group dynamic, the phenomenon could be exploited for use in information operations toward target populations, specifically ones that are multiethnic, multicultural, or multireligious. Although development of the theoretical framework behind neurocognitive hacking is ongoing, mortality-related stimuli are proposed to activate one’s unconscious vigilance system to further evaluate the locus and viability of the suspect stimuli. Research suggests that the subsequent discriminatory affective reactions directed toward out-group members are representative of automatic heuristics evolved to protect the organism in the event a stimulus represents a more serious threat to survival. Therefore, presenting mortality-related stimuli over computer networks to targeted audiences may facilitate the ingestion of tailored propaganda or shaping of specific behavioral outcomes within a population, including sowing division in a target community or weakening support for a specific political regime.

Type
Perspective
Copyright
© Association for Politics and the Life Sciences 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adolphs, R. (2003). Cognitive neuroscience of human social behaviour. Nature Reviews Neuroscience, 4(3), 165178. https://doi.org/10.1038/nrn1056CrossRefGoogle ScholarPubMed
Adolphs, R. (2009). The social brain: Neural basis of social knowledge. Annual Review of Psychology, 60, 693716. https://doi.org/10.1146/annurev.psych.60.110707.163514CrossRefGoogle ScholarPubMed
Adolphs, R., Tranel, D., Damasio, H., & Damasio, A. R. (1995). Fear and the human amygdala. Journal of Neuroscience, 15(9): 58795891.CrossRefGoogle ScholarPubMed
Ajzen, I., & Cote, N. G. (2008). Attitudes and the prediction of behavior. In Crano, W. D. & Prislin, R. (Eds.), Frontiers of social psychology: Attitudes and attitude change (pp. 289311). Psychology Press.Google Scholar
Arndt, J., Greenberg, J., Pyszczynski, T., & Solomon, S. (1997). Subliminal exposure to death-related stimuli increases defense of the cultural worldview. Psychological Science, 8(5), 379385. https://doi.org/10.1111/j.1467-9280.1997.tb00429.xCrossRefGoogle Scholar
Astorino-Courtois, A. (2017). A cognitive capabilities agenda: A multi-step approach for closing DoD’s cognitive capability gap. Strategic Multilayer Assessment Office, U.S. Department of Defense. https://nsiteam.com/a-cognitive-capabilities-agenda-a-multi-step-approach-for-closing-dods-cognitive-capability-gap/Google Scholar
Barnes, J., & Goldman, A. (2019, April 26). FBI warns of Russian interference in 2020 race and boosts counterintelligence operations. New York Times. https://www.nytimes.com/2019/04/26/us/politics/fbi-russian-election-interference.htmlGoogle Scholar
Bohleber, W., & Bohleber, M. (2012). Processes of political and terrorist radicalization in late adolescences—Some case examples [Paper presentation]. Annual Freud Conference, Melbourne, Australia. http://www.freudconference.com/downloads/BohleberLeuzinger-BohleberRadicalizationinadolescence1-2.pdfGoogle Scholar
Bump, P. (2016, December 1). Donald Trump will be president thanks to 80,000 people in three states. Washington Post. https://www.washingtonpost.com/news/the-fix/wp/2016/12/01/donald-trump-will-be-president-thanks-to-80000-people-in-three-states/Google Scholar
Burke, B., Martens, A., & Faucher, E. (2010). Two decades of terror management theory: A meta-analysis of mortality salience research. Personality and Social Psychology Review, 14(2), 155195.CrossRefGoogle ScholarPubMed
Burra, N., Hervais-Adelman, A., Kerzel, D., Tamietto, M., Gelder, B. D., & Pegna, A. J. (2013). Amygdala activation for eye contact despite complete cortical blindness. Journal of Neuroscience, 33(25), 1048310489. https://doi.org/10.1523/jneurosci.3994-12.2013CrossRefGoogle ScholarPubMed
Custers, R. (2009). How does our unconscious know what we want? The role of affect in goal representations. In Moskowitz, G. B. & Grant, H. (Eds.), The psychology of goals (pp. 179202). Guilford Press.Google Scholar
Cybenko, G., Giani, A., & Thompson, P. (2002). Cognitive hacking: A battle for the mind. Computer, 35(8), 5056. https://doi.org/10.1109/mc.2002.1023788CrossRefGoogle Scholar
Devos, T. (2008). Implicit attitudes 101: Theoretical and empirical insights. In Crano, W. D. & Prislin, R. (Eds.), Attitudes and persuasion (pp. 6194). Psychology Press.Google Scholar
Douglas, K. M., Sutton, R. M., Callan, M. J., Dawtry, R. J., & Harvey, A. J. (2015). Someone is pulling the strings: Hypersensitive agency detection and belief in conspiracy theories. Thinking & Reasoning, 22(1), 5777. https://doi.org/10.1080/13546783.2015.1051586CrossRefGoogle Scholar
Duncan, A. J. (2018). New hybrid war or old dirty tricks? The Gerasimov debate and Russia’s response to the contemporary operating environment. Canadian Military Journal, 17(3), 616.Google Scholar
European Commission. (2019). Report on the implementation of the action plan against disinformation. https://eeas.europa.eu/sites/eeas/files/joint_report_on_disinformation.pdfGoogle Scholar
Eysenk, M., Derakshan, N., Sanos, R., & Calvo, M. (2007). Anxiety and cognitive performance: Attentional control theory. Emotion, 7(2), 336353.CrossRefGoogle Scholar
Fang, Z., Li, H., Chen, G., & Yang, J. (2016). Unconscious processing of negative animals and objects: Role of the amygdala revealed by fMRI. Frontiers in Human Neuroscience, 10. https://doi.org/10.3389/fnhum.2016.00146CrossRefGoogle ScholarPubMed
Fessler, D. M., & Navarrete, C. D. (2005). The effect of age on death disgust: Challenges to terror management perspectives. Evolutionary Psychology, 3(1), 147470490500300. https://doi.org/10.1177/147470490500300120CrossRefGoogle Scholar
Fessler, D. M., Pisor, A. C., & Holbrook, C. (2017). Political orientation predicts credulity regarding putative hazards. Psychological Science, 28(5), 651660. https://doi.org/10.1177/0956797617692108CrossRefGoogle ScholarPubMed
Fitzgerald, F. F. (1972). Fire in the lake. Atlantic Monthly Press.Google Scholar
Gauthier, C. (2011). Are we afraid or anxious about death? Clarifying the meaning of “terror” in terror management theory [Doctoral dissertation]. New School for Social Research.Google Scholar
Glassner, B. (1985). Review of Social identity and intergroup relations, by Tajfel, H.. Contemporary Sociology, 14(4), 520521. https://doi.org/10.2307/2069233.CrossRefGoogle Scholar
Goel, S., Williams, K., & Dincelli, E. (2017). Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems, 18(1), 2244. https://doi.org/10.17705/1jais.00447CrossRefGoogle Scholar
Greenberg, J., Pyszczynski, T., & Solomon, S. (1986). The causes and consequences of a need for self-esteem: A terror management theory. In Baumeister, R. F. (Ed.), Public and private self (pp. 189212). Springer-Verlag. https://doi.org/10.1007/978-1-4613-9564-5_10CrossRefGoogle Scholar
Greenberg, J., Pyszczynski, T., Solomon, S., Rosenblatt, A., Veeder, M., Kirkland, S., & Lyon, D. (1990). Evidence for terror management theory II: The effects of mortality salience on reactions to those who threaten or bolster the cultural worldview. Journal of Personality and Social Psychology, 58(2), 308318. https://doi.org/10.1037//0022-3514.58.2.308CrossRefGoogle Scholar
Guess, A., Nagler, J., & Tucker, J. (2019). Less than you think: Prevalence and predictors of fake news dissemination on Facebook. Science Advances, 5(1). https://doi.org/10.1126/sciadv.aau4586CrossRefGoogle ScholarPubMed
Halpern, S. (2018, March 30). Cambridge Analytica and the perils of psychographics. The New Yorker. https://www.newyorker.com/news/news-desk/cambridge-analytica-and-the-perils-of-psychographicsGoogle Scholar
Haselton, M. G., Bryant, G. A., Wilke, A., Frederick, D. A., Galperin, A., Frankenhuis, W. E., & Moore, T. (2009). Adaptive rationality: An evolutionary perspective on cognitive bias. Social Cognition, 27(5), 733763. https://doi.org/10.1521/soco.2009.27.5.733CrossRefGoogle Scholar
Haselton, M. G., & Buss, D. M. (2000). Error management theory: A new perspective on biases in cross-sex mind reading. Journal of Personality and Social Psychology, 78(1), 8191. https://doi.org/10.1037//0022-3514.78.1.81CrossRefGoogle ScholarPubMed
Heslen, J. (2016). Leading a more effective intelligence community: Understanding and managing the cognitive challenges of human intelligence collection in lethal environments [Doctoral dissertation]. University of Oklahoma.Google Scholar
Hogg, M. A., Terry, D. J., & White, K. M. (1995). A tale of two theories: A critical comparison of identity theory with social identity theory. Social Psychology Quarterly, 58(4), 255269. https://doi.org/10.2307/2787127CrossRefGoogle Scholar
Holbrook, C., Sousa, P., & Hahn-Holbrook, J. (2011). Unconscious vigilance: Worldview defense without adaptations for terror, coalition, or uncertainty management. Journal of Personality and Social Psychology, 101(3), 451466. https://doi.org/10.1037/a0024033CrossRefGoogle ScholarPubMed
Jorgenson, L. A., Newsome, W. T., Anderson, D. J., Bargmann, C. I., Brown, E. N., Deisseroth, K., … Wingfield, J. C. (2015). The brain initiative: Developing technology to catalyse neuroscience discovery. Philosophical Transactions of the Royal Society B: Biological Sciences, 370(1668), 20140164. https://doi.org/10.1098/rstb.2014.0164CrossRefGoogle ScholarPubMed
Jost, J., Banaji, M., & Nosek, B. (2016). A decade of system justification theory: Accumulated evidence of conscious and unconscious bolstering of the status quo. Political Psychology, 25(6), 881919. https://doi.org/10.31234/osf.io/6ue35CrossRefGoogle Scholar
Jowett, G. S., & O’Donnell, V. (1986). Propaganda and persuasion. Sage Publications.Google Scholar
Kahneman, D. (2011). Thinking, fast and slow. Farrar, Straus and Giroux.Google Scholar
Kirkpatrick, L., & Navarrete, C. (2006). Reports of my death anxiety have been greatly exaggerated: A critique of terror management theory from an evolutionary perspective. Psychological Inquiry, 17(4), 288298. https://doi.org/10.1080/10478400701366969CrossRefGoogle Scholar
Kumar, S., Kriegstein, K. V., Friston, K., & Griffiths, T. D. (2012). Features versus feelings: Dissociable representations of the acoustic features and valence of aversive sounds. Journal of Neuroscience, 32(41), 1418414192. https://doi.org/10.1523/jneurosci.1759-12.2012CrossRefGoogle ScholarPubMed
Lane, R. D., & Nadel, L. (2002). Cognitive neuroscience of emotion. Oxford University Press.Google Scholar
Laretzaki, G., Plainis, S., Vrettos, I., Chrisoulakis, A., Pallikaris, I., & Bitsios, P. (2011). Threat and trait anxiety affect stability of gaze fixation. Biological Psychology, 86(3), 330336. https://doi.org/10.1016/j.biopsycho.2011.01.005CrossRefGoogle ScholarPubMed
Larson, E., Darilek, R., Kaye, D., Morgan, F., Nichiporuk, B., Durham-Scott, D., Thurston, C., & Leuschner, K. (2009). Understanding commanders’ information needs for influence operations (Report No W74V8H-06-C-0001). RAND Corporation. https://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG656.pdfGoogle Scholar
Levy, B. R., Pilver, C., Chung, P. H., & Slade, M. D. (2014). Subliminal strengthening. Psychological Science, 25(12), 21272135. https://doi.org/10.1177/0956797614551970CrossRefGoogle ScholarPubMed
Maguire, E. A., Woollett, K., & Spiers, H. J. (2006). London taxi drivers and bus drivers: A structural MRI and neuropsychological analysis. Hippocampus, 16(12), 10911101. https://doi.org/10.1002/hipo.20233CrossRefGoogle ScholarPubMed
Markova, I. (2008). Persuasion and propaganda. Diogenes, 55(1), 3751. https://doi.org/10.1177/0392192107087916CrossRefGoogle Scholar
Meyer, R. (2014, June 28). Everything we know about Facebook’s secret mood manipulation experiment. The Atlantic. https://www.theatlantic.com/technology/archive/2014/06/everything-we-know-about-facebooks-secret-mood-manipulation-experiment/373648/Google Scholar
Nagl, J. A. (2002). Learning to eat soup with a knife: Counterinsurgency lessons from Malaya and Vietnam. University of Chicago Press.Google Scholar
Nasrallah, M., Carmel, D., & Lavie, N. (2009). Murder, she wrote: Enhanced sensitivity to negative word valence. Emotion, 9(5), 609618. https://doi.org/10.1037/a0016305CrossRefGoogle ScholarPubMed
National Public Radio. (2018, March 27). They don’t care: Whistleblower says Cambridge Analytica aims to undermine democracy. https://www.npr.org/sections/thetwo-way/2018/03/27/597279596/they-don-t-care-whistleblower-says-cambridge-analytica-seeks-to-undermine-democrGoogle Scholar
Nyabola, N. (2019, February 15). The spectre of Cambridge Analytica still haunts African elections. Al Jazeera. https://www.aljazeera.com/indepth/opinion/nigerian-elections-money-190215080009476.htmlGoogle Scholar
Office of the Director of National Intelligence. (2017, January 6). Background to ‘Assessing Russian activities and intentions in recent US elections’: The analytic process and cyber incident attribution. https://www.dni.gov/files/documents/ICA_2017_01.pdfGoogle Scholar
Pearson, E. (2015). The Case of Roshonara Choudhry: Implications for theory on online radicalization, ISIS women, and the gendered jihad. Policy & Internet, 8(1), 533. https://doi.org/10.1002/poi3.101CrossRefGoogle Scholar
Pedersen, W. S., & Larson, C. L. (2016). State anxiety carried over from prior threat increases late positive potential amplitude during an instructed emotion regulation task. Emotion, 16(5), 719729. https://doi.org/10.1037/emo0000154CrossRefGoogle ScholarPubMed
Phelps, E. A., Oconnor, K. J., Cunningham, W. A., Funayama, E. S., Gatenby, J. C., Gore, J. C., & Banaji, M. R. (2000). Performance on indirect measures of race evaluation predicts amygdala activation. Journal of Cognitive Neuroscience, 12(5), 729738. https://doi.org/10.1162/089892900562552CrossRefGoogle ScholarPubMed
Polyakova, A., & Boyer, S. P. (2018). The Future of political warfare: Russia, the West, and the coming age of global digital competition. Brookings Institution. https://www.brookings.edu/wp-content/uploads/2018/03/the-future-of-political-warfare.pdfGoogle Scholar
Quirin, M., Loktyushin, A., Arndt, J., Küstermann, E., Lo, Y.-Y., Kuhl, J., & Eggert, L. (2011). Existential neuroscience: A functional magnetic resonance imaging investigation of neural responses to reminders of one’s mortality. Social Cognitive and Affective Neuroscience, 7(2), 193198. https://doi.org/10.1093/scan/nsq106CrossRefGoogle ScholarPubMed
Rosenblatt, A., Greenberg, J., Solomon, S., Pyszczynski, T., & Lyon, D. (1989). Evidence for terror management theory I: The effects of mortality salience on reactions to those who violate or uphold cultural values. Journal of Personality and Social Psychology, 57(4), 681690. https://doi.org/10.1037//0022-3514.57.4.681CrossRefGoogle ScholarPubMed
Singer, P.W., Emerson, B.T. (2018). Like War: The Weaponization of Social Media. Houghton-Mifflin Harcourt Publishing.Google Scholar
Solomon, S., Greenberg, J., & Pyszczynski, T. (2004). The cultural animal: Twenty years of terror management theory and research. In Greenberg, J., Koole, S. L., & Pyszczynski, T. (Eds.), Handbook of experimental existential psychology (pp. 1334). Guilford Press.Google Scholar
Stanovich, K., & West, R. (2000). Individual differences in reasoning: Implications for the rationality debate. Behavioral and Brain Sciences, 23(5), 645726. https://doi.org/10.1017/s0140525x00003435CrossRefGoogle ScholarPubMed
Taylor, P. M. (2003). Munitions of the mind: A history of propaganda from the ancient world to the present day. Manchester University Press.Google Scholar
Thomas, T. (2004). Russia’s reflexive control theory and the military. Journal of Slavic Military Studies, 17(2), 237256. https://doi.org/10.1080/13518040490450529CrossRefGoogle Scholar
Tritt, S. M., Inzlicht, M., & Harmon-Jones, E. (2012). Toward a biological understanding of mortality salience (and other threat compensation processes). Social Cognition, 30(6), 715733. https://doi.org/10.1521/soco.2012.30.6.715CrossRefGoogle Scholar
U.S. Department of the Army. (2003). Psychological operations tactics, techniques, and procedures (FM 33-1-1). https://fas.org/irp/doddir/army/fm3-05-301.pdfGoogle Scholar
U.S. Department of Justice. (2018). United States of America v. Internet Research Agency LLC. https://www.justice.gov/file/1035477/downloadGoogle Scholar
U.S. Department of Defense (2014). JP-3-13, Information Operations (JP 3-13). https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdfGoogle Scholar
Valeriano, B., & Jensen, B. (2019). The myth of the cyber defense: The case for restraint (Policy Analysis No. 862). CATO Institute. https://www.cato.org/publications/policy-analysis/myth-cyber-offense-case-restraintGoogle Scholar
Votel, J., Clevland, C., Connett, C., & Irwin, W. (2016). Unconventional warfare in the gray zone. Joint Forces Quarterly, 80, 101109.Google Scholar
Weimann, G. (2015). Terrorist migration to social media. Georgetown Journal of International Affairs, 16(1), 180187.Google Scholar
Weingarten, E., Chen, Q., Mcadams, M., Yi, J., Hepler, J., & Albarracin, D. (2016). On priming action: Conclusions from a meta-analysis of the behavioral effects of incidentally-presented words. Current Opinion in Psychology, 12, 5357. https://doi.org/10.1016/j.copsyc.2016.04.015CrossRefGoogle ScholarPubMed
Whalen, P. J. (1998). Fear, vigilance, and ambiguity: Initial neuroimaging studies of the human amygdala. Current Directions in Psychological Science, 7(6), 177188. https://doi.org/10.1111/1467-8721.ep10836912CrossRefGoogle Scholar
Wheeler, M. E., & Fiske, S. T. (2005). Controlling racial prejudice. Psychological Science, 16(1), 5663. https://doi.org/10.1111/j.0956-7976.2005.00780.x.CrossRefGoogle ScholarPubMed
Windsor, L. (2018). The language of radicalization: Female internet recruitment to participation in ISIS activities. Terrorism and Political Violence. Advance online publication. https://doi.org/10.1080/09546553.2017.1385457Google Scholar
Winkielman, P., & Berridge, K. C. (2004). Unconscious emotion. Current Directions in Psychology, 13(3), 120123.CrossRefGoogle Scholar
Winkielman, P., Berridge, K. C., & Wilbarger, J. L. (2005). Unconscious affective reactions to masked happy versus angry faces influence consumption behavior and judgments of value. Personality and Social Psychology Bulletin, 31(1), 121135. https://doi.org/10.1177/0146167204271309CrossRefGoogle ScholarPubMed
Zajonc, R. (2001). Mere exposure: A gateway to the subliminal. Current Directions in Psychological Science, 10(6), 224228. https://doi.org/10.1111/1467-8721.00154CrossRefGoogle Scholar