COGNITIVE SOVEREIGNTY FRAMEWORK CYBER STRATEGY INSTITUTE
Layer 0 β€” Active Manipulation Techniques Β· Living Taxonomy

CTSS Threat Explorer

"If it feels like marketing, it's wrong. If it feels like doctrine, it's right." β€” The threat taxonomy is not a product catalog. It is a classified operational registry scored for prioritized defense allocation.

18 technique families scored 0–100 using the Cognitive Threat Severity Score. Click any card for the full operational detail: mechanism, CTSS component breakdown, primary domains, and countermeasures by CSF domain. The sidebar provides persistent index access.

T-CT-008 Β· DS-002 Β· CTSS 90 β€” Highest in Taxonomy

The Swarm Threat

Persuasion at Phase A is evolutionary, not authored. No human decides which narrative wins β€” the narratives that spread are the ones that maximize engagement. Truth is irrelevant to survival in this selection process.

The highest-scoring threat in the taxonomy. Phase A is fully operational today. Understanding the three phases defines the timeline you are working against. Click each phase for the full operational picture.

Detection Module β€” S1 / S2 / S3
CTSS Breakdown β€” T-CT-008 Memetic Swarm
90 / 100 CRITICAL
(5Γ—0.25)+(4Γ—0.30)+(5Γ—0.20)+(2Γ—0.15)+(4Γ—0.10)Γ—20 = 90
The Unanswerable Question β€” CSF Cognitive Threat Assessment
"The question is not whether autonomous swarm influence will happen. The question is whether we will have the mechanisms to detect it, measure it, and respond to it before it becomes irreversible."
Layer +2 β€” Observable Effects Β· Measurement Layer

Human Outcome Indicators

The true metric is not misinformation detected or propaganda countered. The true metric is the preservation or loss of self-directed cognition. If that metric degrades, the threat exists regardless of source or intent.

When threats succeed, they produce measurable changes in human cognition and behavior. These are observable patterns already present in the population. Click each outcome to examine the cognitive impact, physical manifestation, measurement method, and success threshold.

Wargaming Validated Β· Stress Testing the Framework

Edge Cases

A framework that cannot be falsified is not a framework β€” it is a philosophy. A valid threat assessment must identify the conditions under which even robust defenses fail.

Eight scenarios stress-tested through wargaming. Three are below the 90% coverage threshold β€” meaning no current countermeasure fully addresses them. Click each to examine the gap, the background, and the response approach.

Framework Validation Β· Architect Principle

Coverage & Success Thresholds

Resilience must be observable, not inspirational. If these indicators do not measurably improve, the framework has failed. This is not a philosophical commitment β€” it is an operational requirement.

The spectrum coverage matrix and the live CTSS calculator. 100% coverage is asymptotic β€” what matters is maintaining the capacity to close gaps faster than new threats emerge.

Overall coverage: ~92%. The remaining 8% falls into swarm adaptation exceeding detection, long-cycle civilizational effects, and genuinely novel mechanisms not yet observable.
Remaining Gaps β€” Active Research

Score any technique using CTSS. Enter 0–5 for each component. (LΓ—0.25 + IaΓ—0.30 + RΓ—0.20 + DΓ—0.15 + RecDΓ—0.10) Γ— 20

Adversarial Reproduction Standard β€” Non-Ideological Instrumentation
Before submitting a CTSS score: could an analyst with opposing views, using this same evidence and methodology, arrive at the same score? The framework must be trusted by parties who do not trust each other. That constraint shapes every scoring decision.