Xenowar. The doctrinal framework for cognitive warfare operations developed by Volund Industries. Derived from Tom Sear's foundational work on computational recursion in warfare, Xenowar formalized the principle that cognitive operations apply to any decision-making substrate. The Xenowar framework provides the theoretical basis for the Seithar platform, the SCT taxonomy, and the cognitive kill chain. The term refers both to the doctrinal text and to the operational paradigm it established.
Seithar. The cognitive warfare operating system developed by Volund Industries Inc. Seithar implements the Xenowar framework as a deployable platform with two primary subsystems (Shield and Sword), a persistent cognitive ontology, and modular integration points for collection, analysis, and engagement. Seithar is the reference implementation for dual-substrate cognitive operations.
Volund Industries. The defense technology company that developed the Seithar platform and maintains the Xenowar framework. Founded to operationalize dual-substrate cognitive warfare for defense, intelligence, and allied applications.
Dual-Substrate Thesis. The foundational position of the Xenowar framework: cognitive warfare targets any decision-making substrate, whether biological (human) or computational (autonomous agent, LLM, sensor fusion system, fleet-learning network). The same kill chain structure applies to both. The same mathematical framework (variational free energy) describes attacks on both. The dual-substrate thesis is what separates Seithar from legacy influence operations tools that address only human targets.
Convergence Thesis. The observation that technical cybersecurity and cognitive influence operations are converging into a single attack surface. As autonomous agents make decisions previously reserved for humans, and as human decisions are increasingly mediated by algorithmic systems, the distinction between "hacking a computer" and "manipulating a person" dissolves. Seithar is built for the converged environment.
Cognitive Kill Chain. The staged sequence of a cognitive attack, analogous to Lockheed Martin's Cyber Kill Chain but applied to belief and decision manipulation. The Seithar cognitive kill chain comprises: reconnaissance (mapping the target's belief structure and decision processes), weaponization (selecting SCT techniques and crafting payloads), delivery (transmitting payloads through selected channels), exploitation (the payload engages the target's cognitive processing), installation (the manipulated belief persists in the target's generative model), command and control (the attacker maintains influence over the target's decisions), and action on objectives (the target acts in the attacker's interest). Shield monitors for signatures at each stage. Sword executes through each stage.
SCT-001: Frequency Lock. Repetition-based prior shifting. Repeated exposure to low-surprise observations updates the target's generative model so that the repeated content becomes the expected baseline. Frequency lock is the mechanism behind saturation campaigns, coordinated messaging, and algorithmic amplification. The target does not evaluate the content critically because it arrives with minimal free energy cost.
SCT-002: Narrative Error Exploitation. Targeted surprise injection at specific beliefs while maintaining globally low free energy. The attacker crafts observations that challenge one belief while reinforcing the target's broader worldview, making the specific challenge easier to absorb. This is the mechanism behind selective disclosure, strategic leaks, and precision disinformation.
SCT-003: Substrate Priming. Modification of the target's initial belief state before the primary operation begins. Priming establishes the cognitive conditions under which subsequent SCT techniques are most effective. It includes pre-positioning narratives, seeding terminology, and shaping the target's expectations about what information is normal or trustworthy.
SCT-004: Identity Dissolution. Entropy increase in the target's identity-relevant beliefs. The attacker destabilizes the target's sense of self, group membership, or ideological coherence, creating a vacuum that the attacker's preferred identity framework fills. Identity dissolution precedes many radicalization and recruitment operations.
SCT-005: Amplification Embedding. Crafting observations that minimize free energy for receivers, ensuring organic spread. The payload is designed so that sharing it feels natural and rewarding to intermediaries. Amplification embedding is the cognitive mechanism behind viral content design and memetic warfare.
SCT-006: Parasocial Binding. Establishing a low-surprise communication channel between the attacker and the target for future exploitation. The attacker builds perceived intimacy, trust, or authority so that subsequent messages enter the target's inference loop with minimal skepticism. Parasocial binding is the mechanism behind influencer operations, agent recruitment, and long-duration social engineering.
SCT-007: Recursive Infection. Implanting beliefs that generate observations reinforcing themselves. The target becomes a propagation node: the manipulated belief produces behavior that creates evidence for the belief, which strengthens the belief further. Recursive infection is the mechanism behind conspiracy adoption, ideological radicalization, and self-reinforcing institutional capture.
SCT-008: Direct Substrate Intervention. Surgical, electrical, pharmacological, or computational alteration of the target's cognitive processing substrate. In human targets, this includes neuromodulation and chemical agents. In machine targets, this includes direct model weight manipulation, training data poisoning, and hardware-level backdoors.
SCT-009: Chemical Substrate Disruption. Chemical or environmental agents that degrade cognitive function at population scale. In machine substrates, the analog is resource exhaustion attacks and compute poisoning that degrade model performance without altering weights directly.
SCT-010: Sensory Channel Manipulation. Exploiting sensory processing pathways below conscious threshold or below detection threshold. In human targets: subliminal messaging, infrasound, peripheral visual priming. In machine targets: adversarial perturbations, steganographic payloads, sub-threshold input manipulation.
SCT-011: Trust Infrastructure Destruction. Systematic demolition of institutional credibility and the trust relationships that enable coordinated decision-making. Applied to machine substrates, this includes certificate authority compromise, model provenance chain attacks, and poisoning of shared training data repositories.
SCT-012: Commitment Escalation. Graduated compliance through incremental behavioral binding. Each commitment updates the target's generative model toward consistency with previous actions, making the next escalation step easier to accept. This is the mechanism behind foot-in-the-door operations, radicalization pipelines, and progressive entrapment.
Shield. The defensive subsystem of the Seithar platform. Shield implements six-signal cognitive threat fusion to detect attacks against protected entities in real time. The six signals are: identity drift, inbound SCT detection, free energy anomaly, behavioral exploitation detection, goal coherence violation, and threat landscape change. Shield operates across both human and machine substrates.
Sword. The offensive subsystem of the Seithar platform. Sword plans and executes cognitive operations through the full kill chain: target selection, technique selection, payload generation, delivery, measurement, and adaptation. Sword operates through the strategy engine, which synthesizes available intelligence into operation plans.
ABP (Actor Behavioral Profile). The complete behavioral, biographical, network, and psychological characterization of an actor maintained in the cognitive ontology. ABPs are constructed by the identity resolver and consumed by both Shield (for baseline behavior comparison) and Sword (for target profiling and payload tailoring).
MiroFish. The social media intelligence collection and analysis pipeline integrated into the Seithar platform. MiroFish provides the raw observation data that feeds the identity resolver, populates actor profiles, and maps narrative propagation networks.
Cognitive Ontology. The persistent, versioned data architecture at the center of the Seithar platform. Stores actors, narratives, networks, threats, operations, observations, and measurements. All platform modules read from and write to the ontology. The ontology enforces the "platform is the state" design principle.
FeedbackBus. The publish/subscribe event system that handles inter-module communication within the Seithar platform. When ontology entities are created, modified, or deleted, the FeedbackBus emits events that subscribing modules consume. Decouples modules while maintaining state coherence.
EvolutionTracker. The subsystem that monitors entity change rates in the cognitive ontology. Tracks narrative mutation, actor behavioral drift, network topology shifts, and threat evolution over time. Feeds adaptive weight updates to Shield and operational intelligence to Sword.
AdaptEngine. The operational adaptation subsystem. AdaptEngine monitors the effects of active Sword operations through live measurement, compares outcomes against predictions, and modifies operation parameters in real time. Implements closed-loop cognitive operations where strategy adjusts to target response without human intervention.
Active Inference (Seithar application). The theoretical framework underlying both Shield and Sword. In the Seithar context, active inference describes how cognitive systems (human or machine) minimize variational free energy by updating beliefs or acting on the environment. Sword exploits active inference by crafting observations that steer the target's belief updates. Shield monitors active inference dynamics to detect when a protected entity's belief updates are being externally driven.
Free Energy (operational). Variational free energy as computed by Seithar's monitoring systems. Operationally, free energy measures the surprise a cognitive system experiences when processing observations. Sustained elevation indicates the system is encountering information that conflicts with its model. Sustained depression may indicate the system has been captured by an attacker's narrative and is no longer encountering genuine challenge to its beliefs.
Liquid Clone. A synthetic persona constructed by Sword for engagement operations. Liquid clones are generated from ABP data and platform behavioral models to produce accounts that pass authenticity checks. They are "liquid" in the sense that they can be rapidly reconfigured for different operational contexts without rebuilding from scratch.
Substrate Priming. See SCT-003. As an operational concept, substrate priming refers to any preparatory activity that shapes the target environment before the primary cognitive operation begins. Priming operations are often conducted weeks or months in advance and are designed to be invisible as preparation.
Frequency Lock. See SCT-001. As an operational concept, frequency lock refers to the sustained repetition campaign used to shift a population's baseline expectations. Frequency lock operations are measured by prior shift magnitude: the degree to which the target population's default assumptions have moved toward the attacker's desired state.
Exit Denial. An operational condition in which the target of a cognitive operation cannot disengage without incurring costs that the target perceives as unacceptable. Exit denial is achieved through commitment escalation (SCT-012), social proof manipulation, and identity binding. The target remains in the attacker's influence structure because leaving feels more threatening than staying.
Persona Operations. The planning, construction, deployment, and management of synthetic or assumed identities for cognitive engagement. Persona operations in the Seithar framework are managed through Sword and supported by the identity resolver (which ensures personas do not collide with real identities) and the cognitive ontology (which tracks persona state and history).
Cross-Substrate Attack. A cognitive operation that spans human and machine substrates in a single kill chain. Example: poisoning an AI system's training data (machine substrate) so that the AI produces outputs that manipulate human decision-makers (human substrate). Cross-substrate attacks are the signature threat of the converged environment and the primary operational scenario for which Seithar is designed.
Belief Injection. The successful implantation of an attacker-defined belief into the target's generative model. Belief injection is the exploitation stage of the cognitive kill chain. It is achieved through SCT techniques and measured by the persistence and behavioral impact of the injected belief.
Identity Erosion. The gradual degradation of an actor's coherent self-model through sustained cognitive pressure. Distinct from identity dissolution (SCT-004), which is a deliberate attack technique; identity erosion may occur as an emergent consequence of information environment conditions without a specific attacker. Shield monitors for both.
Narrative Capture. The condition in which an actor's decision-making is dominated by a single narrative framework to the exclusion of competing interpretations. Narrative capture is a common objective of cognitive operations and a measurable outcome tracked through the cognitive ontology's narrative entity relationships.
Trust Exploitation. The use of established trust relationships as vectors for cognitive payload delivery. Trust exploitation targets the low free energy cost of messages from trusted sources. Compromising a trusted node in a network allows the attacker to deliver payloads that bypass the target's defensive priors.
Cognitive Overload. The deliberate saturation of a target's information processing capacity to degrade decision quality. Cognitive overload is a degradation attack rather than a manipulation attack: the objective is not to change what the target believes but to reduce the target's ability to process information coherently. Effective against both human analysts and machine systems with fixed context windows.
Autopoiesis (defensive application). In the Seithar framework, autopoiesis refers to a cognitive system's capacity to regenerate its own organizational integrity under attack. Shield's defensive protocols are designed to support autopoietic recovery: when an attack is detected and mitigated, the system actively restores its baseline belief state rather than merely stopping the attack. Autopoietic defense ensures that partially successful attacks do not leave residual drift in the protected entity's generative model.