{"id":6430,"date":"2026-01-08T00:10:49","date_gmt":"2026-01-08T00:10:49","guid":{"rendered":"https:\/\/cisanewsletter.com\/?p=6430"},"modified":"2026-01-08T00:04:18","modified_gmt":"2026-01-08T00:04:18","slug":"the-palaeolithic-hack-social-influence-and-cognitive-warfare","status":"publish","type":"post","link":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/","title":{"rendered":"The Palaeolithic Hack: Social Influence and Cognitive Warfare"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>Social influence\u2014the ability to shape the behaviour of others without the use of force\u2014is the foundational software of human cooperation. For millennia, it was the mechanism that allowed human beings to organise, survive, and build civilisations. However, the digitisation of this ancient mechanism has introduced a profound vulnerability into the heart of modern statecraft.<\/p>\n\n\n\n<p>As we navigate an era defined by what the Carnegie Endowment for International Peace calls &#8220;The Global Battle for Minds,&#8221; we must recognise that our adversaries are not hacking our computers so much as they are hacking our biology. They are exploiting an &#8220;evolutionary mismatch&#8221;: the dangerous gap between our Stone Age neural hardware and our Digital Age environment.<\/p>\n\n\n\n<p>This article explores the evolutionary trajectory of social influence\u2014from the small hunter-gatherer band to the modern algorithmic influencer\u2014and outlines why this shift represents a high-level national security threat, enabling cognitive warfare, eroding social cohesion, and bypassing the defences of the modern nation-state.<\/p>\n\n\n\n<p><strong>The Evolutionary Arc of Influence<\/strong><\/p>\n\n\n\n<p>To understand the modern threat, we must trace the lineage of leadership. Evolutionary anthropologist Joseph Henrich and psychologist Francisco Gil-White posit the Dual Strategies Theory, suggesting that human influence evolved through two distinct phases before arriving at our current, volatile moment.<\/p>\n\n\n\n<p><em>Phase I: The Band and the Rise of &#8220;Prestige&#8221;<\/em><\/p>\n\n\n\n<p>For approximately 95% of human history, humans lived in small, egalitarian bands (the environment of evolutionary adaptedness). In these groups of 50 to 150 people\u2014consistent with Dunbar\u2019s Number\u2014brute force was a risky strategy. As noted by anthropologist Christopher Boehm in <em>Hierarchy in the Forest<\/em>, early humans utilised &#8220;levelling mechanisms&#8221; (ridicule, ostracism) to suppress bullies.<\/p>\n\n\n\n<p>Consequently, leadership was not taken; it was given. This is the birth of Prestige.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Competence-Based:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>We evolved a powerful learning bias to identify and copy the most skilled individuals (the best hunter, the most articulate peacemaker).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Proximity and Verification:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Influence was local and verifiable. If the &#8220;Headman&#8221; failed to find water, his influence evaporated.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Utility:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>We followed &#8220;influencers&#8221; because it directly aided our survival.<\/p>\n\n\n\n<p><em>Phase II: The State and the Rise of &#8220;Dominance&#8221;<\/em><\/p>\n\n\n\n<p>With the agricultural revolution, societies scaled beyond the village. Direct verification of a leader\u2019s skills became impossible. To maintain order among millions, humanity shifted toward Dominance and Institutional Authority.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We learned to follow titles, uniforms, and hierarchies (Kings, CEOs, Generals) rather than just individuals.<\/li>\n\n\n\n<li>Influence became transactional and coercive, often backed by the state\u2019s monopoly on violence.<\/li>\n<\/ul>\n\n\n\n<p><em>Phase III: The Digital Reversion (The Current Threat)<\/em><\/p>\n\n\n\n<p>The digital revolution has triggered a &#8220;pseudo-return&#8221; to the Palaeolithic dynamic, but with a toxic twist. Social media has dismantled the gatekeepers of Phase II (institutions\/media) and returned us to Phase I: we once again look to individuals for truth.<\/p>\n\n\n\n<p>However, this is where the security threat emerges. Modern influencers trigger our ancestral &#8220;Prestige&#8221; detectors, but without the ancestral safeguards:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Parasocial Illusion:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>When an influencer speaks into a camera, our mirror neurons register eye contact and intimacy. We perceive them as &#8220;tribe members,&#8221; creating a deep, trust-based bond that state institutions cannot replicate.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>De-coupled Competence:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>In the band, you signalled status by bringing home a gazelle (costly signalling). Online, status is signalled through &#8220;likes&#8221; and algorithmic visibility. We are evolutionarily wired to follow the &#8220;most visible&#8221; human, assuming they must be the most competent. Today, that is rarely true.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Super-Normal Stimuli:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Just as junk food hijacks our craving for calories, the internet offers a &#8220;super-normal stimulus&#8221; of social validation. We are bombarded by hyper-successful, hyper-attractive &#8220;leaders,&#8221; short-circuiting our ability to assess reality.<\/p>\n\n\n\n<p><strong>The National Security Consequence<\/strong><\/p>\n\n\n\n<p>This evolutionary hacking creates specific avenues for malign influence:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cognitive Warfare:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Adversary states understand that we trust &#8220;people like us&#8221; more than institutions. By co-opting or mimicking local influencers, they can bypass a nation&#8217;s &#8220;immune system.&#8221; As propaganda is most effective when it comes from a source perceived as authentic.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Erosion of Governance:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>When a crisis hits (e.g., a pandemic or financial crash), the population faces a choice: listen to the &#8220;Dominant&#8221; institution (The Ministry of Health) or the &#8220;Prestigious&#8221; influencer. Because of our evolutionary bias toward the &#8220;Headman&#8221; we know and love, large swaths of the public ignore expert advice, leading to governance failure.<\/p>\n\n\n\n<p><strong>Policy Recommendations: A Doctrine of Cognitive Resilience<\/strong><\/p>\n\n\n\n<p>Defending the state in this environment requires moving beyond &#8220;Information Control&#8221; (censorship) toward &#8220;Cognitive Resilience.&#8221; We must accept that the human brain is the terrain of this conflict.<\/p>\n\n\n\n<p><strong>A. Strategic Partnership with &#8220;Trusted Nodes&#8221;<\/strong><\/p>\n\n\n\n<p>Governments often suffer from a &#8220;warmth&#8221; deficit. They possess authority but lack intimacy. Intelligence and security agencies must adopt a liaison model, identifying and briefing &#8220;Trusted Nodes&#8221;\u2014community leaders, niche influencers, authoritative NGO like CISA Ghana and independent journalists who hold organic prestige within their digital tribes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Recommendation:<\/em> Establish &#8220;Information Liaison Offices&#8221; that provide verified, high-grade intelligence to these nodes, allowing them to communicate threats to their followers in their own vernacular. We must leverage the &#8220;Headman&#8221; to protect the village.<\/li>\n<\/ul>\n\n\n\n<p>B. Algorithmic Transparency as Operations Security (OpSec) &nbsp;<\/p>\n\n\n\n<p>The speed at which influence spreads is the weapon, not just the content. The Brookings Institution has argued that algorithmic amplification is a matter of public interest.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Recommendation:<\/em> Legislation should demand transparency regarding &#8220;inauthentic amplification.&#8221; If a narrative is trending due to bot networks or foreign state coordination, platforms must declare this context. This breaks the &#8220;Social Proof&#8221; loop; if users know the &#8220;crowd&#8221; is fake, their biological urge to follow it diminishes.<\/li>\n<\/ul>\n\n\n\n<p>C. Cognitive Immunology in Education<\/p>\n\n\n\n<p>We must treat the mind as a domain of warfare that requires training to defend.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Recommendation:<\/em> Following the Finnish model of media literacy, national curricula must include evolutionary psychology. Citizens should be taught <em>why<\/em> they trust influencers and how their tribal instincts are manipulated. A citizen who understands their own neural vulnerabilities is a harder target for foreign influence.<\/li>\n<\/ul>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>The modern influencer is not merely a marketing vehicle; they are a resurfaced archetype of our evolutionary past\u2014the &#8220;Headman&#8221; or &#8220;Big Man&#8221;\u2014operating with the technological reach of a nation-state.<\/p>\n\n\n\n<p>For security agencies, the lesson is stark: We cannot bombard a population with facts and expect compliance if we ignore the biology of trust. The adversary has already weaponised our social instincts. To survive the age of Cognitive Warfare, we must stop fighting the symptoms of disinformation and start securing the evolutionary hardware\u2014the human mind\u2014that processes it.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Boehm, C. (1999). <em>Hierarchy in the Forest: The Evolution of Egalitarian Behavior.<\/em> Harvard University Press.<\/li>\n\n\n\n<li>DiResta, R. (2024). <em>Invisible Rulers: The People Who Turn Lies into Reality.<\/em><\/li>\n\n\n\n<li>Henrich, J. (2015). <em>The Secret of Our Success: How Culture Is Driving Human Evolution.<\/em> Princeton University Press.<\/li>\n\n\n\n<li>Mazarr, M. J., et al. (2019). <em>The Hostile Social Manipulation Weapon.<\/em> RAND Corporation.<\/li>\n\n\n\n<li>NATO Strategic Communications Centre of Excellence. (2021). <em>Social Media Manipulation and the Future of Cognitive Warfare.<\/em><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Social influence\u2014the ability to shape the behaviour of others without the use of force\u2014is the foundational software of human cooperation. For millennia, it was the mechanism that allowed human beings to organise, survive, and build civilisations. However, the digitisation of this ancient mechanism has introduced a profound vulnerability into the heart of modern statecraft. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6439,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"CISA ANALYST","source_url":"cisanewsletter.com","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"home","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"topbottom","share_float_style":"share-monocrhome","show_share_counter":"0","show_view_counter":"0","show_featured":"1","show_post_meta":"0","show_post_author":"0","show_post_author_image":"1","show_post_date":"0","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":"","disable_ad":"0"},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_review":[],"enable_review":"0","type":"percentage","name":"","summary":"","brand":"","sku":"","good":[{"good_text":""}],"bad":[{"bad_text":""}],"score_override":"","override_value":"","rating":[{"rating_text":"","rating_number":"10"}],"price":[{"shop":"","price":"","link":"","icon":""}],"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"jnews_post_split":{"enable_post_split":"0","post_split":[{"template":"1","tag":"h2","numbering":"asc","mode":"normal","first":"0","enable_toc":"0","toc_type":"normal"}]},"footnotes":""},"categories":[183],"tags":[266,265,272],"class_list":["post-6430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysts","tag-1st-edition-2026","tag-265","tag-jan-week2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Palaeolithic Hack: Social Influence and Cognitive Warfare - CISA NEWSLETTER<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Palaeolithic Hack: Social Influence and Cognitive Warfare - CISA NEWSLETTER\" \/>\n<meta property=\"og:description\" content=\"Introduction Social influence\u2014the ability to shape the behaviour of others without the use of force\u2014is the foundational software of human cooperation. For millennia, it was the mechanism that allowed human beings to organise, survive, and build civilisations. However, the digitisation of this ancient mechanism has introduced a profound vulnerability into the heart of modern statecraft. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/\" \/>\n<meta property=\"og:site_name\" content=\"CISA NEWSLETTER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61558173539135\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-08T00:10:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2026\/01\/Social-Influence-and-Cognitive-Warfare-870x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"870\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CISA EDITORIAL\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:site\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CISA EDITORIAL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/\"},\"author\":{\"name\":\"CISA EDITORIAL\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\"},\"headline\":\"The Palaeolithic Hack: Social Influence and Cognitive Warfare\",\"datePublished\":\"2026-01-08T00:10:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/\"},\"wordCount\":1130,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Social-Influence-and-Cognitive-Warfare.png\",\"keywords\":[\"1st Edition 2026\",\"2026\",\"Jan week2\"],\"articleSection\":[\"ANALYSTS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/\",\"name\":\"The Palaeolithic Hack: Social Influence and Cognitive Warfare - CISA NEWSLETTER\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Social-Influence-and-Cognitive-Warfare.png\",\"datePublished\":\"2026-01-08T00:10:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Social-Influence-and-Cognitive-Warfare.png\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Social-Influence-and-Cognitive-Warfare.png\",\"width\":1236,\"height\":1454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Palaeolithic Hack: Social Influence and Cognitive Warfare\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"name\":\"CISA NEWSLETTER\",\"description\":\"Headlining West African News\",\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cisanewsletter.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\",\"name\":\"Centre for Intelligence & Security Analysis Ghana\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"width\":1055,\"height\":1063,\"caption\":\"Centre for Intelligence & Security Analysis Ghana\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61558173539135\",\"https:\\\/\\\/x.com\\\/CisaSocial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\",\"name\":\"CISA EDITORIAL\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"caption\":\"CISA EDITORIAL\"},\"sameAs\":[\"http:\\\/\\\/cisanewsletter.com\"],\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/author\\\/cisa-editorial\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Palaeolithic Hack: Social Influence and Cognitive Warfare - CISA NEWSLETTER","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/","og_locale":"en_US","og_type":"article","og_title":"The Palaeolithic Hack: Social Influence and Cognitive Warfare - CISA NEWSLETTER","og_description":"Introduction Social influence\u2014the ability to shape the behaviour of others without the use of force\u2014is the foundational software of human cooperation. For millennia, it was the mechanism that allowed human beings to organise, survive, and build civilisations. However, the digitisation of this ancient mechanism has introduced a profound vulnerability into the heart of modern statecraft. [&hellip;]","og_url":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/","og_site_name":"CISA NEWSLETTER","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61558173539135","article_published_time":"2026-01-08T00:10:49+00:00","og_image":[{"width":870,"height":1024,"url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2026\/01\/Social-Influence-and-Cognitive-Warfare-870x1024.png","type":"image\/png"}],"author":"CISA EDITORIAL","twitter_card":"summary_large_image","twitter_creator":"@CisaSocial","twitter_site":"@CisaSocial","twitter_misc":{"Written by":"CISA EDITORIAL","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#article","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/"},"author":{"name":"CISA EDITORIAL","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01"},"headline":"The Palaeolithic Hack: Social Influence and Cognitive Warfare","datePublished":"2026-01-08T00:10:49+00:00","mainEntityOfPage":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/"},"wordCount":1130,"commentCount":0,"publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"image":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2026\/01\/Social-Influence-and-Cognitive-Warfare.png","keywords":["1st Edition 2026","2026","Jan week2"],"articleSection":["ANALYSTS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/","url":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/","name":"The Palaeolithic Hack: Social Influence and Cognitive Warfare - CISA NEWSLETTER","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#primaryimage"},"image":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2026\/01\/Social-Influence-and-Cognitive-Warfare.png","datePublished":"2026-01-08T00:10:49+00:00","breadcrumb":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#primaryimage","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2026\/01\/Social-Influence-and-Cognitive-Warfare.png","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2026\/01\/Social-Influence-and-Cognitive-Warfare.png","width":1236,"height":1454},{"@type":"BreadcrumbList","@id":"https:\/\/cisanewsletter.com\/index.php\/the-palaeolithic-hack-social-influence-and-cognitive-warfare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cisanewsletter.com\/index.php\/home\/"},{"@type":"ListItem","position":2,"name":"The Palaeolithic Hack: Social Influence and Cognitive Warfare"}]},{"@type":"WebSite","@id":"https:\/\/cisanewsletter.com\/#website","url":"https:\/\/cisanewsletter.com\/","name":"CISA NEWSLETTER","description":"Headlining West African News","publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cisanewsletter.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cisanewsletter.com\/#organization","name":"Centre for Intelligence & Security Analysis Ghana","url":"https:\/\/cisanewsletter.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","width":1055,"height":1063,"caption":"Centre for Intelligence & Security Analysis Ghana"},"image":{"@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61558173539135","https:\/\/x.com\/CisaSocial"]},{"@type":"Person","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01","name":"CISA EDITORIAL","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","caption":"CISA EDITORIAL"},"sameAs":["http:\/\/cisanewsletter.com"],"url":"https:\/\/cisanewsletter.com\/index.php\/author\/cisa-editorial\/"}]}},"_links":{"self":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts\/6430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/comments?post=6430"}],"version-history":[{"count":1,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts\/6430\/revisions"}],"predecessor-version":[{"id":6431,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts\/6430\/revisions\/6431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/media\/6439"}],"wp:attachment":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/media?parent=6430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/categories?post=6430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/tags?post=6430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}