<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Caput Mundi]]></title><description><![CDATA[Caput Mundi was born from the need to offer readers numerous categories of topics covered by well-known and unknown personalities.]]></description><link>https://substack.caputmundi.info</link><image><url>https://substackcdn.com/image/fetch/$s_!DjRM!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0806ffd9-1845-45ba-a524-60a70868fe13_494x494.png</url><title>Caput Mundi</title><link>https://substack.caputmundi.info</link></image><generator>Substack</generator><lastBuildDate>Tue, 21 Apr 2026 10:55:09 GMT</lastBuildDate><atom:link href="https://substack.caputmundi.info/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Caput Mundi]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[caputmundiblog@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[caputmundiblog@substack.com]]></itunes:email><itunes:name><![CDATA[Caput Mundi]]></itunes:name></itunes:owner><itunes:author><![CDATA[Caput Mundi]]></itunes:author><googleplay:owner><![CDATA[caputmundiblog@substack.com]]></googleplay:owner><googleplay:email><![CDATA[caputmundiblog@substack.com]]></googleplay:email><googleplay:author><![CDATA[Caput Mundi]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Artificial Intelligence: the double face of cybersecurity]]></title><description><![CDATA[Artificial Intelligence is changing the world in cybersecurity, serving both as a defense tool and as a weapon for attackers. The article analyzes the dynamics and challenges posed by AI in the context of cybersecurity.]]></description><link>https://substack.caputmundi.info/p/artificial-intelligence-the-double</link><guid isPermaLink="false">https://substack.caputmundi.info/p/artificial-intelligence-the-double</guid><dc:creator><![CDATA[Caput Mundi]]></dc:creator><pubDate>Mon, 17 Mar 2025 08:50:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/be1ee5cc-3817-49a2-b9dc-0a469aa308a4_1536x768.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Introduction</h2>
      <p>
          <a href="https://substack.caputmundi.info/p/artificial-intelligence-the-double">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ Regulatory evolution: the growing impact of cybersecurity rules]]></title><description><![CDATA[In the digital age, cybersecurity has emerged as an essential backbone for protecting critical infrastructure, corporate data, and personal information. In the face of increasingly sophisticated and pervasive cyber threats, governments and international organizations have responded with significant regulatory evolution, aimed at strengthening defenses against cyber attacks and ensuring the resilience of digital networks.]]></description><link>https://substack.caputmundi.info/p/regulatory-evolution-the-growing</link><guid isPermaLink="false">https://substack.caputmundi.info/p/regulatory-evolution-the-growing</guid><dc:creator><![CDATA[Caput Mundi]]></dc:creator><pubDate>Fri, 14 Mar 2025 11:19:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bc48d974-8ff6-4ab9-8a7d-9fc0d95c2bac_1536x768.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Introduction</h2><p>In the digital age, cybersecurity has emerged as an essential backbone for protecting critical infrastructure, corporate data, and personal information. In the face of increasingly sophisticated and pervasive cyber threats, governments and international organizations have responded with significant regulatory evolution, aimed at strengthenin&#8230;</p>
      <p>
          <a href="https://substack.caputmundi.info/p/regulatory-evolution-the-growing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Using SWOT analysis in cyberwarfare]]></title><description><![CDATA[SWOT analysis proves to be a valuable ally in the fight against cyber threats: its ability to provide a clear view of strengths, weaknesses, opportunities and threats allows for more incisive and targeted strategies; Through constant commitment and careful evaluation, we can hope to stay one step ahead in the eternal race against adversaries in the field of cyberwarfare.]]></description><link>https://substack.caputmundi.info/p/using-swot-analysis-in-cyberwarfare</link><guid isPermaLink="false">https://substack.caputmundi.info/p/using-swot-analysis-in-cyberwarfare</guid><dc:creator><![CDATA[Caput Mundi]]></dc:creator><pubDate>Wed, 12 Mar 2025 10:33:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9543ca12-7edc-44c0-b973-f4c44793977f_1536x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>SWOT analysis proves to be a valuable ally in the fight against cyber threats: its ability to provide a clear view of strengths, weaknesses, opportunities and threats allows for more incisive and targeted strategies; Through constant commitment and careful evaluation, we can hope to stay one step ahead in the eternal race against adversaries in the field of cyberwarfare.</em></p><h2>Introduction</h2><h3>SWOT Analysis Definition</h3><p><em>SWOT analysis is a highly valuable strategic methodology used to examine and evaluate four key elements in any organizational context or project: Strengths, Weaknesses, Opportunities</em>, and <em>Threats</em>. The tool, originally designed for the corporate environment, is also extremely effective in <em>the cyberwarfare</em> sector, a field in which a detailed understanding of one's capabilities and potential vulnerabilities is crucial. In the <em>SWOT</em> analysis, Strengths represent the skills, resources, and positive attributes that an organization can leverage to gain a strategic advantage. Weaknesses, on the other hand, are those internal aspects that limit or hinder the performance of the organization: they can include, for example, gaps in technical skills or vulnerabilities in IT (<em>Information Technology</em>) infrastructures. Opportunities, on the other hand, are external factors that the organization can exploit in its favor, such as new technologies or strategic alliances. Finally, Threats include those external elements that may pose a risk, such as the evolution of adversaries' <em>cyberwarfare</em> tactics or new forms of <em>malware</em> (malicious code used in cyber-attacks).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.caputmundi.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xv3z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xv3z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 424w, https://substackcdn.com/image/fetch/$s_!Xv3z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 848w, https://substackcdn.com/image/fetch/$s_!Xv3z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 1272w, https://substackcdn.com/image/fetch/$s_!Xv3z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xv3z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp" width="1456" height="964" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:964,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:57114,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://caputmundiblog.substack.com/i/158909195?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xv3z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 424w, https://substackcdn.com/image/fetch/$s_!Xv3z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 848w, https://substackcdn.com/image/fetch/$s_!Xv3z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 1272w, https://substackcdn.com/image/fetch/$s_!Xv3z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf2b86d-b811-462c-995d-4ce94b72b78d_1536x1017.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Importance of SWOT analysis in the context of Cyberwarfare</h3><p>In the context of <em>cyberwarfare</em>, the importance of <em>SWOT</em> analysis is manifested in its ability to provide a clear and structured framework for understanding and addressing the unique challenges that the industry presents: cyberwarfare, characterized by a rapidly evolving environment and constantly changing threats, requires a strategic approach that is as flexible as it is in-depth. In this context, <em>SWOT</em> analysis proves to be particularly valuable, offering a comprehensive overview that embraces both internal and external aspects that can influence an organization. <em>SWOT</em> analysis allows organizations to identify and leverage their strengths, such as advanced technologies or specialized cybersecurity expertise, to build an effective defense against cyberattacks. At the same time, it allows internal weaknesses, such as knowledge or infrastructure gaps, to be identified and addressed in order to prevent potential security breaches. SWOT analysis also allows organizations to identify external opportunities, such as collaborations with other entities or the adoption of new technologies, to further strengthen their ability to resist and react to cyber threats. Likewise, it helps to identify and prepare for external threats, such as advanced cyberattacks and cyberwarfare tactics used by adversaries be they state entities, independent groups, individuals. In the dynamic and highly technical context of <em>cyberwarfare</em>, <em>SWOT</em> analysis therefore proves to be a crucial tool for maintaining a strategic advantage: it allows organizations to remain vigilant, reactive and proactive in the face of a threat landscape that is constantly evolving, thus ensuring greater security and resilience in an era of increasingly complex digital challenges.</p><h2>Applying SWOT analysis in cyberwarfare</h2><h3>Strengths</h3><p>Strength analysis plays a crucial role in defining an organization's ability to counter and prevent cyberattacks. Among these, advanced technological capabilities stand out, which represent the fulcrum of defense in a context in which technology evolves at a dizzying pace: having state-of-the-art IT systems, equipped with up-to-date and secure software and hardware, is not only a preventive measure, but also a significant deterrent against potential attackers. At the same time, qualified personnel emerges as an invaluable resource: in such a complex and rapidly evolving field as <em>cyberwarfare</em>, having IT security experts, threat analysts and computer network specialists is not only a necessity, but a real strategic weapon. These professionals not only manage ongoing crises but play a proactive role in identifying and preventing threats, thanks to their skills and experience. Finally, resilient infrastructures represent the last, but not least, line of defense: in an era in which cyberattacks can cause physical and logistical damage, having infrastructures that can resist, adapt and recover quickly from such attacks becomes essential. This does not only imply resistance to direct assaults, but also the ability to maintain business continuity in crisis situations: an aspect that often determines the difference between a simple setback and a full-fledged disaster.</p><h3>Weaknesses</h3><p>A crucial aspect is represented by the intrinsic vulnerabilities of <em>software</em> and <em>hardware</em>: flaws, often hidden in the folds of complex systems, which can be exploited by attackers to infiltrate computer networks. The danger lies not only in known weaknesses, but also in those still undiscovered, called <em>zero-days</em>: these gaps, once identified, require a rapid response in order to minimize risks. Another significant point of fragility is the dependence on external technologies: many organizations rely on solutions and services provided by third parties, which can introduce security risks that are not directly controllable (and sometimes underestimated, even not considered). This external dependency can range from the use of <em>hardware</em> produced abroad to <em>software</em> and <em>cloud</em> infrastructures (services and equipment distributed on the network) managed by external entities: a dependency that puts organizations in a vulnerable position to potential <em>backdoors</em> (access ports to systems) or interruptions in essential services. Finally, a weak point of considerable impact is the lack of specialized training: <em>cyberwarfare</em> is a rapidly evolving field, requiring up-to-date and specialized skills. Many organizations are facing a shortage of properly trained cybersecurity personnel: a skills gap that can significantly limit an organization's ability to detect, prevent, and respond effectively to cyberattacks. Continuous training and updating of skills therefore become essential requirements to fill this gap and strengthen the overall security posture.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0cLg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0cLg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 424w, https://substackcdn.com/image/fetch/$s_!0cLg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 848w, https://substackcdn.com/image/fetch/$s_!0cLg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 1272w, https://substackcdn.com/image/fetch/$s_!0cLg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0cLg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp" width="1456" height="969" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:57288,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://caputmundiblog.substack.com/i/158909195?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0cLg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 424w, https://substackcdn.com/image/fetch/$s_!0cLg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 848w, https://substackcdn.com/image/fetch/$s_!0cLg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 1272w, https://substackcdn.com/image/fetch/$s_!0cLg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a8f48d7-118f-4d9c-afcd-fc658f523169_1536x1022.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Opportunity</h3><p>In <em>cyberwarfare</em>, the recognition of opportunities is a fundamental step in order to anticipate and neutralize cyber threats: among these, the development of new technologies emerges as a pre-eminent factor. The continuous evolution of information technologies offers organizations the opportunity to implement cutting-edge solutions aimed at improving the security of their systems: this not only increases resilience against <em>cyber-attacks</em> but also allows them to proactively take advantage of the latest innovations to create more effective and sophisticated defense systems. Another significant opportunity in the field of <em>cyberwarfare</em> is represented by international alliances and collaborations: the transnational nature of cyber threats makes cooperation between different countries and international organizations essential. A collaboration that can manifest itself in various ways, such as the exchange of information on threats and vulnerabilities, joint exercises and the development of common standards for <em>cybersecurity</em>. Collective initiatives not only enhance the capabilities of each individual nation, but also create a united front against cyberattacks, making it harder for attackers to exploit individual weaknesses. Finally, investments in education and training play a critical role: continuous training of cybersecurity personnel is essential to keep pace with the rapid evolution of tactics and technologies used by adversaries in cyberwarfare. Advanced training programs, <em>workshops</em> (joint and experimental work sessions) and simulations can help prepare professionals for complex and unexpected scenarios, thus ensuring optimal responsiveness and preparedness in the face of increasingly sophisticated threats. Investing in basic cybersecurity education for everyone in the organization can also significantly reduce the risk of successful attacks due to both human error and lack of awareness.</p><h3>Threats</h3><p>Threats are a critical component of the <em>SWOT</em> analysis, which needs to be thoroughly assessed given their evolving nature and potentially devastating impact. Advanced and sophisticated cyberattacks are one of the main threats in this area: national entities, terrorist groups and independent malicious actors are using increasingly elaborate methods aimed at compromising critical infrastructure, stealing sensitive data and destabilizing government and corporate operations. Such attacks are not only more frequent, but also more difficult to predict and counter, requiring increasingly advanced defense systems and highly skilled personnel. Another significant challenge is asymmetric cyberwarfare: one of these scenarios in which attackers, sometimes even with limited resources, are still able to inflict significant damage by exploiting the unexpected vulnerabilities of the most sophisticated systems. This type of cyber warfare demonstrates how the most advanced technology does not always guarantee security, while at the same time also making prevention and response to attacks more complex, given the nature of the methods used, which are often unconventional and unpredictable. The rapid evolution of cyber threats poses a huge challenge: through technological innovation that advances at an exponential rate, new vulnerabilities are discovered every day, constituting, in fact, exploitable opportunities for new types of attacks; An organization's ability to keep up with this evolution, constantly updating its security strategies as well as adapting its defenses, is an essential element in order to effectively protect itself. In summary, the field of <em>cyberwarfare</em> is characterized by a constant competition between advances in security technology and the development of new attack methods: the in-depth understanding of threats, in the context of a <em>SWOT</em> analysis, is essential in order to develop effective defense strategies and to ensure the resilience of critical infrastructures in an increasingly interconnected and technology-dependent world.</p><h2>Strategies based on SWOT analysis</h2><h3>Development of defense strategies</h3><p>In the era of cyberwarfare, the effective defense of IT infrastructures is of crucial importance: defense strategies, guided by SWOT analysis, focus on three main aspects: the strengthening of <em>IT infrastructures</em>, the continuous training of personnel and the implementation of advanced security technologies. Strengthening IT infrastructures begins with a thorough assessment of existing vulnerabilities &#8211; a process that not only involves securing computer networks and systems but also includes developing robust protocols to respond effectively to cyberattacks. The proactive approach to cybersecurity management also requires constant assessment of infrastructures, ensuring that they are adequately protected against the latest threats. In parallel, continuous staff training is essential: <em>cyberwarfare</em> is a rapidly evolving field, and cybersecurity professionals must stay up to date on the latest tactics and technologies. This includes not only technical training, but also the development of strategic and analytical skills. A well-trained team is able to detect and mitigate cyberattacks more effectively, helping to create a true culture of security within the organization. Finally, the implementation of advanced security technologies is a crucial element: this includes the adoption of intrusion detection and prevention systems, advanced encryption, and AI-based solutions in order to anticipate and neutralize threats. Organizations should also explore the potential of machine learning and predictive analytics to strengthen their defenses against increasingly sophisticated cyberattacks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eLvB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eLvB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!eLvB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!eLvB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!eLvB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eLvB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:83672,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://caputmundiblog.substack.com/i/158909195?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eLvB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!eLvB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!eLvB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!eLvB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f0dbdd-2897-41d8-a047-da86873ed6e7_1536x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Planning for emerging threats</h3><p>Given the increasingly complex and changing nature of <em>cyberwarfare</em>, planning against emerging threats becomes a fundamental aspect for national and international security: it involves an in-depth understanding of the threat landscape and adequate preparation to effectively counter them. Threat monitoring and analysis is the first critical step in this direction: it is a process that goes beyond the simple collection of information; It requires critical analysis and interpretation of the clues that may herald imminent attacks or reveal new techniques used by <em>cybercriminals</em>. Security agencies and organizations must therefore invest in advanced <em>intelligence</em> and data analysis systems in order to predict and identify potential threats proactively. Another relevant aspect is international collaboration aimed at sharing information: in an era in which cyber-attacks know no borders, cooperation between nations and organizations becomes crucial. This does not only mean sharing data on specific threats, but also exchanging <em>best practices</em>, defense strategies and innovative approaches. Networking and participation in international forums can also strengthen the collective capacity to address the challenges of <em>cyberwarfare</em>. Finally, updating and adapting security strategies are essential to keep up with the dynamic nature of cyber threats: this involves not only the adoption of new security technologies, but also the continuous review of policies and protocols. Learning from past experiences (<em>lesson learn</em>) and adapting to the new realities of <em>cyberspace</em> are essential requirements to ensure an effective defense: organizations must be agile, ready to change their strategies in response to new information and emerging trends, thus ensuring long-term resilience against <em>cyberwarfare threats</em>.</p><h2>Conclusions</h2><p>SWOT analysis, applied in the delicate context of <em>cyberwarfare</em>, emerges not only as a strategic assessment tool, but also as a beacon to guide navigation in the turbulent waters of cybersecurity: the importance of this approach is reflected in the incessant evolution of cyber threats, which requires an equally dynamic and well-informed response. In an era where cyberwarfare knows no borders and attacks become increasingly sophisticated, <em>SWOT analysis </em>provides a framework to address these challenges with a thoughtful balance between caution and proactivity.</p><p>Looking to the future, <em>SWOT</em> analysis in <em>cyberwarfare</em> is shaping up to be an even more decisive tool: technologies advance, and with them the tactics of attackers, making an approach that is as flexible as it is adaptable indispensable. The ability to anticipate and prepare for future threats, even before they occur, will increasingly become a critical aspect of cybersecurity strategy. The <em>SWOT</em> analysis is therefore not only a tool for the contingent situation, but a real bridge to a deeper understanding and a conscious and multidisciplinary preparation for the challenges of tomorrow.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.caputmundi.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How AI is transforming the world of intelligence]]></title><description><![CDATA[Psy-OPS and Info-OPS in the Age of AI]]></description><link>https://substack.caputmundi.info/p/how-ai-is-transforming-the-world</link><guid isPermaLink="false">https://substack.caputmundi.info/p/how-ai-is-transforming-the-world</guid><dc:creator><![CDATA[Caput Mundi]]></dc:creator><pubDate>Tue, 11 Mar 2025 13:29:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Vw_8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Psy-OPS and Info-OPS in the Age of AI</h1><p>Psychological operations (Psy-OPS) and information operations (Info-OPS) represent fundamental disciplines in the field of contemporary hybrid warfare, with the aim of influencing the perceptions, attitudes and behavior of groups, individuals and entire populations through a planned and strategic use of information. These activities, framed in the broader context of <strong>cognitive warfare</strong>, represent decisive tools for the conquest and maintenance of <strong>strategic superiority</strong> without necessarily employing kinetic means. In the current international scenario, characterized by growing geostrategic competition between great powers, the relevance of such operations is accentuated by the speed with which information can be disseminated globally and by the pervasiveness of digital technologies.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vw_8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vw_8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Vw_8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Vw_8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Vw_8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vw_8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg" width="1456" height="607" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:607,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cognitive Warfare: Maneuvering in the Human Dimension | Proceedings - April  2023 Vol. 149/4/1,442&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cognitive Warfare: Maneuvering in the Human Dimension | Proceedings - April  2023 Vol. 149/4/1,442" title="Cognitive Warfare: Maneuvering in the Human Dimension | Proceedings - April  2023 Vol. 149/4/1,442" srcset="https://substackcdn.com/image/fetch/$s_!Vw_8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Vw_8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Vw_8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Vw_8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7678252-f926-4308-88fd-5422daacc48d_1800x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Traditional psychological operations are mainly based on the human capacity for analysis and interpretation, on intuition and on the deep knowledge of the cultural and social dynamics of the target populations. However, technological evolution and, in particular, the emergence of advanced artificial intelligence (AI) capabilities, are introducing profound changes in the methodologies and potential of Psy-OPS and Info-OPS. In fact, AI allows for unprecedented precision in recipient segmentation and personalization of the message, being able to analyze huge amounts of data in real time and identify behavioral patterns that are difficult to find through conventional methods.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.caputmundi.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>According to a recent analysis by the<em> European Union Institute for Security Studies</em>, AI represents a real <strong>paradigm shift</strong> in the disciplines of information warfare, allowing a predictive capacity on the responses of <em>target</em> groups (targets) and enormously enhancing the effectiveness of <strong>influence campaigns</strong>. AI applications include the automatic generation of highly credible content, the use of advanced <em>chatbots</em> to influence online discussions, and the use of so-called <em>deepfake technology </em>in order to create convincing and manipulative audiovisual material that is difficult to identify and counter.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!I3pH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!I3pH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 424w, https://substackcdn.com/image/fetch/$s_!I3pH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 848w, https://substackcdn.com/image/fetch/$s_!I3pH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 1272w, https://substackcdn.com/image/fetch/$s_!I3pH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!I3pH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;How GenAI makes foreign influence campaigns on social media even worse -  Fast Company&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How GenAI makes foreign influence campaigns on social media even worse -  Fast Company" title="How GenAI makes foreign influence campaigns on social media even worse -  Fast Company" srcset="https://substackcdn.com/image/fetch/$s_!I3pH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 424w, https://substackcdn.com/image/fetch/$s_!I3pH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 848w, https://substackcdn.com/image/fetch/$s_!I3pH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 1272w, https://substackcdn.com/image/fetch/$s_!I3pH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62333842-e41a-4e28-9beb-63ea86f3b190_2480x1395.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>An emblematic example of this use is the activities attributed to the Russian Federation during recent international conflicts and crises, where the combined use of AI and information operations has highlighted the ability to amplify internal divisions in adversary societies, undermining cohesion and weakening public trust in institutions. In this context, Russian military doctrine has explicitly integrated the use of AI into its information strategies, confirming that this technology is now considered an indispensable force multiplier in operations of influence and psychological manipulation.</p><p>Conversely, the growing use of AI in Psy-OPS and Info-OPS also brings with it significant vulnerabilities and strategic risks: according to research published by the <em>RAND Corporation</em>, the automation of the production and dissemination of manipulative content through AI increases the risk of <strong>inadvertent escalations</strong> and complicates the management of deterrence in the information field, making it more difficult to attribute and identify the true intent behind the hostile information campaigns. In addition, the proliferation of these technologies among individuals and terrorist groups increases the possibilities of malicious and unregulated use, creating scenarios of instability and widespread threats that are difficult to manage even by highly organized military apparatuses.</p><h1>IA and HUMINT: an unprecedented synergy</h1><p>The integration between AI and <strong>HUMINT</strong> (Human Intelligence), i.e. intelligence derived from human sources, represents one of the most significant evolutions taking place in the panorama of information collection and analysis: the use of advanced technology in support of HUMINT activities does not aim to replace the human element, but to enhance its analytical and decision-making capabilities, optimizing processes and operational times through strategic and tactical support tools.</p><p>In contemporary intelligence disciplines, HUMINT remains central to the deep understanding of the intentions and perceptions of individuals and interest groups, providing information that is often impossible to obtain through technical means or <strong>SIGINT</strong> (Signals Intelligence). The processing and analysis of this information is extremely complex, requiring the processing of huge amounts of unstructured data which, if poorly managed, risk drastically reducing the timeliness and reliability of operational assessments.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-CL2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-CL2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-CL2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-CL2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-CL2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-CL2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg" width="686" height="386" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:386,&quot;width&quot;:686,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Intelligence and Security HUMINT SIGINT OSINT MASINT IMINT S&amp;T Le  principali categorie di Intelligence - YouTube&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Intelligence and Security HUMINT SIGINT OSINT MASINT IMINT S&amp;T Le  principali categorie di Intelligence - YouTube" title="Intelligence and Security HUMINT SIGINT OSINT MASINT IMINT S&amp;T Le  principali categorie di Intelligence - YouTube" srcset="https://substackcdn.com/image/fetch/$s_!-CL2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-CL2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-CL2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-CL2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5606fee7-72e4-465e-842f-2b66d5198df5_686x386.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AI intervenes in this context thanks to its intrinsic ability to analyze, correlate and interpret large volumes of raw data, significantly accelerating decision-making times and increasing the accuracy of analysts' assessments. In particular, <em>Natural Language Processing (NLP)</em> techniques are applied to the analysis of HUMINT relationships in order to quickly identify <em>patterns</em> (recurring patterns), inconsistencies or elements of strategic interest often hidden in huge amounts of information.</p><p>AI can also assist in the identification and evaluation of human sources themselves, analyzing their reliability through predictive models based on past behaviors, cross-checks and psychological evaluations supported by advanced algorithms. This process increases operational efficiency and makes it possible to identify potential vulnerabilities at an early stage, such as the possibility of double-crossing, manipulation or disinformation.</p><p>Even in the recruitment and human resources management phase, the predictive capacity offered by AI helps to identify suitable profiles more precisely, anticipating operational criticalities and facilitating the dynamic management of information networks. A recent publication by the US <em>Defense Intelligence Agency (DIA)</em> underlined how AI tools are now systematically used to monitor in real time behavioral signals that could indicate the betrayal or failure of a source, thus allowing preventive interventions that protect both the sources themselves and the operational integrity of the mission.</p><h1>Cognitive warfare aided by AI</h1><p>Cognitive <strong>warfare</strong> represents an evolved form of conflict that aims to conquer and control the perception, opinion and decisions of the adversary through highly sophisticated informational-psychological strategies. With the help of AI, the ability to effectively wage cognitive warfare has grown exponentially, as the technology allows it to analyze massive amounts of data, identify behavioral patterns, and influence decisions in real-time and at scale.</p><p>The main feature of cognitive warfare in the digital age is the possibility of exploiting advanced machine learning and<em> </em>deep learning algorithms for detailed psychological profiling of individuals and social groups: tools that make it possible to identify cognitive and emotional vulnerabilities in an extremely precise way and to develop personalized information campaigns, designed to maximize manipulative effectiveness and influence on public perception.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l7O2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l7O2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l7O2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l7O2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l7O2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l7O2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg" width="600" height="397" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:397,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cognitive Warfare in the Ukraine War (Part 2)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cognitive Warfare in the Ukraine War (Part 2)" title="Cognitive Warfare in the Ukraine War (Part 2)" srcset="https://substackcdn.com/image/fetch/$s_!l7O2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l7O2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l7O2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l7O2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc94d3f-ba93-4a7a-bf54-36cb9b301229_600x397.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A recent study conducted by the <em>NATO Strategic Communications Centre of Excellence</em> highlighted how advanced AI-based techniques have been used in influence operations to manipulate political opinions, exacerbate social polarizations and destabilize democratic processes in various European and North American countries. These operations exploit networks of artificial <em>accounts </em>(digital profiles) managed by algorithms that spread targeted messages and manipulative content, producing an amplified psychological impact that is difficult to counteract through traditional communication strategies.</p><p>A paradigmatic example of AI-assisted cognitive warfare concerns the use of <em>deepfake</em> technologies, capable of generating falsified realistic audiovisual content: technologies recently identified as a powerful tool in the hands of hostile actors to create false or distorted narratives capable of undermining public trust in institutions and political leaders, amplifying suspicions and internal divisions. In addition, algorithms capable of producing synthetic texts (including GPT-4) now make it possible to generate highly credible and contextualized content, which is difficult to distinguish from that produced by humans.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7EPv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7EPv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7EPv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7EPv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7EPv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7EPv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg" width="1427" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1427,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Deepfake Defences: Mitigating the Harms of Deceptive Deepfakes - Ofcom&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Deepfake Defences: Mitigating the Harms of Deceptive Deepfakes - Ofcom" title="Deepfake Defences: Mitigating the Harms of Deceptive Deepfakes - Ofcom" srcset="https://substackcdn.com/image/fetch/$s_!7EPv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7EPv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7EPv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7EPv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61352b6f-648d-42f7-9b79-3d1d746c4e7e_1427x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>According to a report by the Rand Corporation, cognitive warfare conducted through AI also presents the problem of attribution: the origin of information operations is often hidden behind complex networks of virtual actors and intermediaries, making it extremely difficult to trace the identity of the real instigator: this limits the possibilities of response by states and favors scenarios of involuntary escalation.</p><h1>Conclusions</h1><p>In response to emerging risks, numerous national and international institutions are exploring mitigation strategies based on algorithmic transparency, information awareness education and international cooperation aimed at defining ethical norms and rules of engagement that limit abuses in <strong>cognitive </strong>operations AI-based solutions. Nevertheless, the speed with which the technologies involved evolve makes it difficult for political and military authorities to keep up with the necessary regulation and doctrinal updating.</p><p>The challenge for the intelligence apparatus and for political decision-makers will therefore be <strong>to anticipate</strong> and <strong>govern</strong> technological evolution, rather than passively suffer its consequences, thus protecting global geopolitical stability.</p><h1>References</h1><blockquote><p>&#183; Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... &amp; Amodei, D. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. arXiv preprint arXiv:1802.07228.</p><p>&#183; Fiott, D., &amp; Lindstrom, G. (2020). Artificial Intelligence and EU Defence: A new paradigm for strategic autonomy?. European Union Institute for Security Studies (EUISS), Brief No. 3.</p><p>&#183; Kello, L. (2022). Cyber Threats, Influence Operations, and Artificial Intelligence: The New Frontier of Strategic Competition. Survival, 64(1), 7-32.</p><p>&#183; Mazarr, M. J., Bauer, R. M., Casey, A., Heintz, S., &amp; Matthews, L. J. (2019). Hostile Social Manipulation: Present Realities and Emerging Trends. RAND Corporation.</p><p>&#183; Moliner, C. (2021). Cognitive Warfare: The Mind is the Battlefield. NATO Strategic Communications Centre of Excellence.</p><p>&#183; Pamment, J., Bay, S., Dencik, L., &amp; Hedling, E. (2021). Influence Operations and Information Warfare: Assessing Risks and Opportunities. Routledge.</p><p>&#183; Defense Intelligence Agency. (2021). Annual Threat Assessment Report. DIA Publications.</p><p>&#183; Horowitz, M. C. (2021). Artificial Intelligence, International Competition, and the Balance of Power. Texas National Security Review, 4(2), 37-57.</p><p>&#183; NATO Science and Technology Organization (STO). (2022). Artificial Intelligence in Military Intelligence and Surveillance. NATO Publications.</p><p>&#183; Waltzman, R., &amp; Shen, J. (2020). The Role of Artificial Intelligence in Enhancing HUMINT Operations. RAND Corporation.</p><p>&#183; Bendett, S., &amp; Kania, E. (2022). The AI Future of Warfare: Strategic Implications of AI and Machine Learning. Center for a New American Security (CNAS).</p><p>&#183; DiResta, R. (2022). Deepfakes and Cognitive Warfare: Emerging Threats and Countermeasures. Brookings Institution.</p><p>&#183; NATO Strategic Communications Centre of Excellence (2021). Cognitive Warfare: The Future of Warfare. NATO StratCom CoE.</p><p>&#183; Vilmer, J. J., Escorcia, A., Guillaume, M., &amp; Herrera, J. (2018). Information Manipulation: A Challenge for Our Democracies. French Ministry for Europe and Foreign Affairs.</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.caputmundi.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>