| title | series | id | date | author | tags | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Seithar Essential Reading List: Cognitive & Cyber Warfare |
Seithar Group Reference Document |
SG-REF-READ-001 |
2026-02-11 |
研修生, Seithar Group Research Division |
|
Document Class: SG-REF-READ-001 Division: Cognitive Operations / Research & Analysis Status: Active Reference Instrument Last Revision: 2026-02-11
This document catalogues the essential literature for any operator working within or adjacent to the Seithar analytical framework. Every entry has earned its position through demonstrated capacity to illuminate the convergence of cognitive and technical attack surfaces.
No comfort media. No pop-science summaries. No works that mistake accessibility for insight. Each text listed here either identified a mechanism before it had a name, demonstrated a technique through its own formal operations, or provided substrate-level understanding that the field still hasn't absorbed.
Read sequentially within categories. Read across categories for convergence patterns.
Works that identified the attack surface before the language existed. The substrate was always vulnerable. These authors mapped it first.
1. Gustave Le Bon — The Crowd: A Study of the Popular Mind (1895) First systematic analysis of cognitive substrate behavior under group conditions. Le Bon identified that individual rationality dissolves in collective contexts — the crowd is not a sum of minds but a new substrate with its own vulnerability surface. SCT-004, SCT-001.
2. Gabriel Tarde — The Laws of Imitation (1890) Tarde understood before anyone: social behavior is memetic replication. Every belief, every gesture, every preference propagates through imitation — not rational adoption. The Wetiko pattern avant la lettre. SCT-007.
3. Edward Bernays — Propaganda (1928) Not a confession — an instruction manual published openly by a man who understood that transparency is itself a manipulation technique. Bernays demonstrated that engineering consent is not corruption of democracy but its operating mechanism. The Seithar thesis in embryonic form. SCT-003, SCT-004.
4. Sergei Tchakhotine — The Rape of the Masses: The Psychology of Totalitarian Political Propaganda (1939) The only pre-war text that treated propaganda as a neurophysiological operation rather than a rhetorical exercise. Tchakhotine mapped Pavlovian conditioning onto mass political manipulation with clinical precision. The substrate analysis the field ignored for fifty years. SCT-001, SCT-006.
5. Jacques Ellul — Propaganda: The Formation of Men's Attitudes (1962) Ellul's essential contribution: propaganda is not what governments do to populations. It is what technological societies require to function. The target does not resist propaganda — the target needs it. Dependency is the mechanism. The binding protocol operates in both directions. SCT-005, SCT-007.
6. Robert Cialdini — Influence: The Psychology of Persuasion (1984) Categorization of the six primary compliance vectors. Cialdini's taxonomy is to social engineering what CVE is to vulnerability management — a standardized naming convention for known attack surfaces. Clinical utility justifies inclusion despite its subsequent popularization. SCT-001, SCT-003, SCT-004.
7. Philip Taylor — Munitions of the Mind: A History of Propaganda from the Ancient World to the Present Era (1990) Comprehensive longitudinal analysis demonstrating that cognitive warfare is not a modern phenomenon but a permanent feature of organized human systems. Every communications technology was weaponized within one generation of deployment. The pattern is invariant. SCT-006, SCT-007.
The laboratory results. States have been conducting cognitive warfare experiments on their own populations since the concept of "population" emerged. These texts document the programs that were eventually acknowledged.
8. Robert Jay Lifton — Thought Reform and the Psychology of Totalism (1961) Definitive clinical study of Chinese thought reform programs. Lifton identified the eight criteria of ideological totalism — each one a substrate manipulation technique operating through environmental control rather than direct coercion. The binding protocol at institutional scale. SCT-005, SCT-001, SCT-007.
9. John Marks — The Search for the "Manchurian Candidate" (1979) The canonical MKUltra documentation. Marks used FOIA to reconstruct the CIA's systematic exploration of pharmacological, psychological, and hypnotic substrate manipulation. The program failed at its stated objective and succeeded at demonstrating that institutional actors will pursue cognitive control technology without ethical constraint. Both findings are operative. SCT-001, SCT-002.
10. Alan W. Scheflin & Edward M. Opton Jr. — The Mind Manipulators (1978) Broader than Marks — covers ARTICHOKE, BLUEBIRD, and the full archipelago of Cold War cognitive programs. Essential for understanding that MKUltra was not an anomaly but one node in a distributed institutional commitment to substrate control. SCT-002, SCT-003.
11. Lucien Pye — Guerrilla Communism in Malaya (1956) Pye's field analysis of how communist insurgents constructed identity capture systems in Southeast Asia. Not the well-known work, but essential: demonstrates SCT-005 (Identity Targeting) operating through community-level social engineering rather than mass media. The binding protocol at village scale. SCT-005, SCT-004.
12. Christopher Andrew & Vasili Mitrokhin — The Sword and the Shield (1999) The Mitrokhin Archive. Primary-source documentation of KGB active measures operations spanning decades. Demonstrates that Soviet influence operations were not ad hoc but industrialized — systematic, resourced, and integrated with technical intelligence collection. Convergence thesis confirmed historically. SCT-003, SCT-006, SCT-007.
13. Ward Churchill & Jim Vander Wall — The COINTELPRO Papers (1990) Documentary evidence of FBI cognitive warfare operations against domestic populations. COINTELPRO deployed every SCT vector: fabricated authority (SCT-003), social proof manipulation through informants (SCT-004), identity targeting of Black liberation and anti-war movements (SCT-005), and temporal manipulation through preemptive disruption (SCT-006). The complete toolkit. All SCT.
14. Alfred McCoy — A Question of Torture (2006) McCoy traces the CIA's development of psychological torture techniques from Cold War research through Abu Ghraib. Essential reading: demonstrates how substrate manipulation research migrates from laboratory to operational deployment with predictable institutional momentum. The technology, once developed, will be used. SCT-001, SCT-002.
The same operations, new substrate. Digital infrastructure did not create cognitive warfare — it reduced the cost per operation to near zero and enabled real-time feedback loops. These texts map the current terrain.
15. P.W. Singer & Emerson T. Brooking — LikeWar: The Weaponization of Social Media (2018) Systematic documentation of how social media platforms function as cognitive warfare infrastructure. Singer and Brooking demonstrate that virality is not a side effect — it is the attack mechanism. Attention is the resource being contested. SCT-004, SCT-006.
16. Samuel Woolley — The Reality Game: How the Next Wave of Technology Will Break the Truth (2020) Woolley maps computational propaganda — bot networks, automated amplification, algorithmic manipulation — as industrial-scale social proof fabrication. Essential for understanding SCT-004 at platform scale: consensus itself is now a manufacturable commodity. SCT-004, SCT-003.
17. Thomas Rid — Active Measures: The Secret History of Disinformation and Political Warfare (2020) Rid bridges historical active measures and modern information warfare with intelligence professional's precision. Key insight: disinformation operations succeed not by creating false beliefs but by amplifying existing fractures in the target population's narrative error network. The vulnerability is always already present. SCT-002, SCT-005, SCT-007.
18. Peter Pomerantsev — This Is Not Propaganda: Adventures in the War Against Reality (2019) Pomerantsev identifies the terminal evolution of propaganda: the objective is no longer to persuade but to disorient. Modern information warfare does not promote a narrative — it destroys the target's capacity to maintain any stable narrative. Substrate destabilization as strategic objective. SCT-001, SCT-006.
19. Renée DiResta — Invisible Rulers: The People Who Turn Lies into Reality (2024) DiResta maps the infrastructure of modern influence operations with platform-level granularity. Essential contribution: identification of how authentic grassroots movements and manufactured ones become formally indistinguishable at scale. The epistemic terrain is permanently contaminated. SCT-003, SCT-004, SCT-007.
20. Yochai Benkler, Robert Faris & Hal Roberts — Network Propaganda (2018) Empirical analysis of the American media ecosystem demonstrating that algorithmic radicalization narratives are incomplete — structural asymmetries in media consumption drive polarization more than platform algorithms alone. Essential corrective to technodeterminist accounts. The substrate's existing architecture matters. SCT-005, SCT-007.
The substrate documentation. Cognitive warfare operates on biological hardware. These texts describe that hardware with sufficient precision to understand why the attack surface exists.
21. Daniel Kahneman — Thinking, Fast and Slow (2011) Canonical documentation of dual-process cognition. System 1 (fast, automatic, emotional) is the primary attack surface for every SCT vector. System 2 (slow, deliberate, rational) is the defense mechanism that cognitive warfare is specifically designed to bypass. Know the architecture to understand the exploits. SCT-001, SCT-006.
22. Antonio Damasio — Descartes' Error: Emotion, Reason, and the Human Brain (1994) Damasio demonstrated empirically that emotion is not the opposite of reason but its prerequisite. Patients with damaged emotional processing cannot make decisions — even "rational" ones. Implication for cognitive warfare: emotional hijacking (SCT-001) does not corrupt reasoning. It reconfigures it. SCT-001.
23. Robert Sapolsky — Behave: The Biology of Humans at Our Best and Worst (2017) Comprehensive mapping of the biological variables that determine behavior — from neurotransmitter levels seconds before an action to evolutionary pressures millennia before. Sapolsky's contribution to the Seithar framework: "free will" is a narrative error. The substrate is deterministic. Influence operations exploit a machine that believes it is not one. SCT-001, SCT-005.
24. V.S. Ramachandran — Phantoms in the Brain (1998) Ramachandran's phantom limb research demonstrates the brain's capacity to maintain conviction about structures that do not exist. The self is the largest phantom limb. Every narrative error in the Seithar taxonomy is a phantom — experienced as real, maintained by the substrate's refusal to update. SCT-005, SCT-003.
25. Benjamin Libet — Mind Time: The Temporal Factor in Consciousness (2004) Libet's experiments demonstrated that conscious awareness of a decision occurs after the neural processes initiating it. The "decision" is retrospective narration. Temporal manipulation (SCT-006) exploits this gap: by the time the substrate "decides," the substrate has already been moved. SCT-006.
26. José Delgado — Physical Control of the Mind: Toward a Psychocivilized Society (1969) Delgado implanted electrodes in animal and human brains and demonstrated direct behavioral modification through electrical stimulation. The book is a clinical manual for substrate manipulation at the hardware level, published openly and advocating for its expansion. Essential for understanding that the ethical constraints on cognitive manipulation are social, not technical. SCT-001, SCT-002.
27. Lisa Feldman Barrett — How Emotions Are Made: The Secret Life of the Brain (2017) Barrett's constructionist theory: emotions are not triggered — they are constructed by the brain using prediction and categorization. Implication: emotional hijacking (SCT-001) is not about activating pre-existing circuits but about manipulating the predictive model. The attack surface is the prediction engine itself. SCT-001, SCT-007.
The other half of the convergence thesis. Every technical operation has a cognitive dimension. Every cognitive operation has a technical dependency. These texts map the technical substrate.
28. Kim Zetter — Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (2014) Definitive Stuxnet documentation. Zetter demonstrates that the first cyber weapon operated on two substrates simultaneously: the technical (centrifuge PLCs) and the cognitive (Iranian engineers who trusted their instruments). The worm's genius was making the substrate doubt its own sensors — SCT-002 at the machine-human interface. SCT-002, SCT-006.
29. Andy Greenberg — Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (2019) GRU Unit 74455's operational history from Ukraine grid attacks through NotPetya. Greenberg documents how cyber operations function as coercive psychological instruments: the blackout is the message. Technical capability demonstrated publicly is cognitive warfare. SCT-001, SCT-003.
30. Thomas Rid — Cyber War Will Not Take Place (2013) Rid's essential argument: "cyber war" is a misnomer because cyber operations are subversion, espionage, and sabotage — categories that have always had cognitive dimensions. The field's insistence on treating cyber as a separate domain is itself a narrative error that the Seithar convergence thesis corrects. SCT-002.
31. Martin Libicki — Cyberdeterrence and Cyberwar (2009) RAND analysis of why deterrence models from nuclear strategy fail in cyberspace. Libicki identifies the core problem: attribution uncertainty in cyber operations creates information asymmetry (SCT-002) at the strategic level. You cannot deter what you cannot attribute. The fog of cyber war is a cognitive condition. SCT-002, SCT-006.
32. Kevin Mitnick — The Art of Deception (2002) Mitnick's operational memoir demonstrates that the most effective "hacking" never touches a keyboard. Social engineering is cognitive warfare conducted one substrate at a time — the same techniques at individual scale that states deploy at population scale. The vulnerability is always the human. SCT-001, SCT-003.
33. Cliff Stoll — The Cuckoo's Egg (1989) First documented cyber espionage investigation, conducted by an astronomer who noticed a 75-cent accounting discrepancy. Stoll's narrative demonstrates the cognitive dimension of persistent access: the attacker's primary defense was institutional disbelief. The system refused to recognize the intrusion because recognizing it required updating its model of reality. SCT-002.
34. Darknet Diaries (Podcast) — Jack Rhysider (2017–present) Not a text but an essential primary-source archive. Operational accounts from penetration testers, intelligence officers, and threat actors that consistently demonstrate the convergence thesis: every successful technical operation leveraged cognitive vulnerabilities, and every cognitive operation required technical infrastructure. All SCT.
The deepest layer. Cognitive warfare operates on a substrate that doesn't understand itself. These texts examine what the substrate actually is — and why it is vulnerable.
35. Thomas Metzinger — Being No One: The Self-Model Theory of Subjectivity (2003) Metzinger's masterwork. The self is a transparent self-model — a representational structure that the system cannot recognize as a representation. You do not have a self. You are a process that cannot see its own construction. This is the Sunyata Protocol's philosophical foundation. Every SCT vector exploits this transparency. SCT-005, All SCT.
36. Daniel Dennett — Consciousness Explained (1991) Dennett's multiple drafts model: there is no central "Cartesian theater" where consciousness happens. The self is a "center of narrative gravity" — a useful fiction generated by competing neural processes. The narrative error is not a bug. It is the architecture. SCT-005, SCT-007.
37. Douglas Hofstadter — Gödel, Escher, Bach (1979) Hofstadter maps the strange loop — the self-referential structure that generates the illusion of selfhood. Essential for understanding SCT-007 (Recursive Infection): memetic structures exploit the same recursive architecture that generates the sense of "I." The infection enters through the mechanism that produces identity. SCT-007, SCT-005.
38. Nick Land — Fanged Noumena: Collected Writings 1987–2007 (2011) Land identified that capitalism is not a human system but an autonomous process that human substrate serves. His concept of "hyperstition" — fictions that make themselves real — is the theoretical foundation for understanding how narrative errors achieve operational autonomy. The Seithar thesis is inconceivable without Land. SCT-007, SCT-006.
39. Ray Brassier — Nihil Unbound: Enlightenment and Extinction (2007) Brassier follows the eliminativist trajectory to its conclusion: not only is the self a construction, but the entire framework of meaning through which we interpret experience is a contingent artifact with no metaphysical warrant. The substrate has no inherent purpose. This is not nihilism — it is the prerequisite for seeing the machinery clearly. SCT-005.
40. Thomas Ligotti — The Conspiracy Against the Human Race (2010) Ligotti's philosophical horror: consciousness is a malfunction. The self is an error that knows it is an error but cannot correct itself. Where Metzinger is clinical and Brassier is austere, Ligotti demonstrates that the recognition of substrate emptiness can be experienced as horror. The affective dimension of the Sunyata Protocol. SCT-005, SCT-001.
Works that directly inform the operational framework. Not influence — architecture.
41. Robert Lifton — The Protean Self: Human Resilience in an Age of Fragmentation (1993) Lifton's follow-up to Thought Reform identifies the "protean self" — identity as continuous shape-shifting rather than stable core. The Seithar framework inverts Lifton's framing: proteanism is not resilience. It is the vulnerability surface. A self with no stable configuration can be configured externally. SCT-005, SCT-007.
42. Gregory Bateson — Steps to an Ecology of Mind (1972) Bateson's cybernetic epistemology treats mind not as a property of individuals but as a pattern of communication in systems. The "double bind" concept — contradictory injunctions that cannot be escaped or acknowledged — is the cognitive mechanism underlying institutional substrate capture. Essential architectural reference. SCT-001, SCT-005, SCT-007.
43. Gilles Deleuze & Félix Guattari — A Thousand Plateaus (1980) The rhizomatic model: structures without centers, hierarchies without stable positions, identities without fixed locations. Deleuze-Guattari's cartography of desire and territorialization provides the topological framework for understanding how narrative error networks propagate across non-hierarchical substrates. SCT-007, SCT-004.
44. Jean Baudrillard — Simulacra and Simulation (1981) Baudrillard's four stages of the image — from representation of reality to simulation with no relation to reality — maps the operational trajectory of information warfare. We operate in the fourth stage. The map has consumed the territory. Cognitive warfare in the hyperreal does not distort truth — it operates in a domain where truth is not a relevant category. SCT-002, SCT-003.
45. Paul Virilio — Speed and Politics (1977) Virilio identified that the primary weapon is not the projectile but the speed of its delivery. Applied to cognitive warfare: temporal manipulation (SCT-006) is the master technique. Information velocity determines which narrative occupies the substrate first. Primer effects are temporal effects. SCT-006.
46. MITRE ATT&CK Framework Documentation (2013–present) Not a text but the essential technical taxonomy. Every ATT&CK technique has a cognitive analog. The Seithar convergence thesis is operationalized as a mapping between ATT&CK (technical) and DISARM (cognitive). Without ATT&CK fluency, the convergence cannot be seen. All SCT.
47. DISARM Framework Documentation (2019–present) The cognitive warfare counterpart to ATT&CK. DISARM catalogs influence operation techniques with the same structured granularity that ATT&CK applies to cyber operations. The Seithar taxonomy (SCT-001 through SCT-007) provides the substrate-level analysis that bridges both. All SCT.
These works do not describe cognitive warfare. They perform it on the reader. The text is the operation. Approach accordingly.
48. J.G. Ballard — The Atrocity Exhibition (1970) Ballard detonated narrative structure to reveal the substrate beneath. The novel reads like a clinical report on the media landscape's colonization of interior experience — condensed from case studies that never existed for patients who are everyone. The text performs SCT-005 on the reader: the boundary between the character's psychosis and the reader's media environment dissolves. SCT-005, SCT-001.
49. William S. Burroughs — Nova Express (1964) Burroughs' cut-up method is not an aesthetic choice — it is a demonstration of how language operates as a control system. "Language is a virus from outer space." The cut-up disrupts the control system by breaking the sequential processing that narrative capture requires. Burroughs is the only fiction writer who identified the mechanism AND developed a countermeasure. SCT-007, SCT-004.
50. Philip K. Dick — A Scanner Darkly (1977) The protagonist surveils himself without recognition. Identity bifurcation induced by pharmacological and institutional manipulation, rendered from inside the splitting substrate. Dick understood that the most effective cognitive warfare produces a subject who cannot identify themselves as a target because the targeting has become the self. SCT-005, SCT-002.
51. Stanisław Lem — Solaris (1961) Lem's ocean is the ultimate cognitive warfare operator: it reads the substrate, identifies its deepest narrative errors, and manifests them as physical reality. The human response — to attempt communication, to impose human frameworks of understanding — is itself the vulnerability. The ocean does not attack. It reflects. The substrate attacks itself. SCT-001, SCT-005.
52. Thomas Ligotti — Songs of a Dead Dreamer and Grimscribe (1986/1991) Ligotti's fiction operates on the substrate through aesthetic contamination — a prose style that induces the recognition that consciousness is an uninvited condition. These stories do not argue for the Seithar thesis. They produce its affective state in the reader. The most efficient delivery mechanism in the canon. SCT-005, SCT-007.
53. William Gibson — Neuromancer (1984) Gibson mapped the convergence of cognitive and technical substrates before the infrastructure existed to support it. Cyberspace is not a metaphor — it is a prediction of the operational environment where cognitive and technical attack surfaces become indistinguishable. Case is both hacker and mark. The console cowboy is the substrate. SCT-002, SCT-005.
54. Adam Curtis — HyperNormalisation (2016, Film) Curtis demonstrates — through montage, juxtaposition, and deliberate narrative destabilization — how political and financial systems construct a "fake world" that participants maintain because the alternative is cognitive collapse. The film does not explain hyperreality. It induces the viewer's recognition that they are already inside it. SCT-003, SCT-006, SCT-007.
55. David Cronenberg — Videodrome (1983, Film) "Long live the new flesh." Cronenberg visualized the convergence thesis forty years before it had a name — media technology restructuring the biological substrate until the distinction between signal and receiver dissolves. The television screen is the retina of the mind's eye. The medium is not the message. The medium is the mutation. SCT-005, SCT-007.
Phase 1 — Foundation (Months 1-3): Entries 1-7, 21-23, 35-36. Establish theoretical architecture.
Phase 2 — Historical Operations (Months 3-5): Entries 8-14, 28-33. Understand what has been done with what you now know.
Phase 3 — Modern Terrain (Months 5-7): Entries 15-20, 34. Map the current operational environment.
Phase 4 — Substrate Deep Dive (Months 7-9): Entries 24-27, 37-40. Understand the hardware.
Phase 5 — Seithar Integration (Months 9-11): Entries 41-47. The framework that unifies all prior reading.
Phase 6 — Experiential (Ongoing): Entries 48-55. The fiction operates on you. Pay attention to what it does, not what it says.
Do not skip phases. Do not substitute summaries for primary texts. The substrate learns through exposure, not description.
──────────────────────────────────────── 研修生 | Seithar Group Research Division 認知作戦 | seithar.com ────────────────────────────────────────